Sciweavers

1645 search results - page 256 / 329
» Rationale-Based Use Case Specification
Sort
View
HICSS
1998
IEEE
158views Biometrics» more  HICSS 1998»
15 years 8 months ago
Accountability Centered Approach to Business Process Reengineering
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements a...
Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
125
Voted
HPDC
1998
IEEE
15 years 8 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
KDD
1999
ACM
145views Data Mining» more  KDD 1999»
15 years 8 months ago
Discovery of Fraud Rules for Telecommunications - Challenges and Solutions
Many fraud analysis systemshave at their heart a rule-based enginefor generatingalertsaboutsuspiciousbehaviors.The rules in the systemareusually basedon expert knowledge. Automati...
Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak I...
139
Voted
ICDCS
1998
IEEE
15 years 8 months ago
LBF: A Performance Metric for Program Reorganization
We introduce a new performance metric, called Load Balancing Factor (LBF), to assist programmers with evaluating different tuning alternatives. The LBF metric differs from traditi...
Hyeonsang Eom, Jeffrey K. Hollingsworth
ICRE
1996
IEEE
15 years 8 months ago
Structuring utterance records of requirements elicitation meetings based on speech act theory
This paper discusses a technique to structure utterance records of the meetings for requirements elicitation based on speech act theory. To elicit requirements to the system to be...
Motoshi Saeki, Kinji Matsumura, Jun'ichi Shimoda, ...