Sciweavers

30267 search results - page 5592 / 6054
» Process Modelling Languages
Sort
View
ISMIS
2009
Springer
15 years 11 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
LOCA
2009
Springer
15 years 11 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung
PVM
2009
Springer
15 years 11 months ago
Hierarchical Collectives in MPICH2
Abstract. Most parallel systems on which MPI is used are now hierarchical: some processors are much closer to others in terms of interconnect performance. One of the most common su...
Hao Zhu, David Goodell, William Gropp, Rajeev Thak...
AUTONOMICS
2009
ACM
15 years 11 months ago
Sensor Selection for IT Infrastructure Monitoring
Supervisory control is the main means to assure a high level performance and availability of large IT infrastructures. Applied control theory is used in physical and virtualization...
Gergely János Paljak, Imre Kocsis, Zolt&aac...
CHIMIT
2009
ACM
15 years 11 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
« Prev « First page 5592 / 6054 Last » Next »