Sciweavers

3031 search results - page 348 / 607
» SNMS - Shadow Network Management System
Sort
View
EDOC
2008
IEEE
15 years 11 months ago
Achieving Business Process Flexibility with Business Rules
Business processes used in networked business are often large and complex, which makes them difficult to manage and change. In this paper we address this lack of flexibility by pr...
Tim van Eijndhoven, Maria-Eugenia Iacob, Mar&iacut...
132
Voted
KES
2007
Springer
15 years 10 months ago
Hybrid Agents Based Architecture on Automated Dynamic Environments
Abstract. This paper presents a hybrid agents based architecture that uses casebased reasoning and case-based planning systems as reasoning mechanism in deliberative BDI agents to ...
Dante I. Tapia, Javier Bajo, Juan M. Corchado, Sar...
163
Voted
IWIA
2006
IEEE
15 years 10 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
MM
2006
ACM
116views Multimedia» more  MM 2006»
15 years 10 months ago
Mobile camera supported document redirection
In this demonstration, we are going to illustrate how to use a mobile camera to redirect documents to various devices connected to the same network. Categories and Subject Descrip...
Qiong Liu, Paul McEvoy, Cheng-Jia Lai
INTELLCOMM
2004
Springer
15 years 10 months ago
A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs
Abstract. Today, event logs contain vast amounts of data that can easily overwhelm a human. Therefore, the mining of frequent patterns from event logs is an important system and ne...
Risto Vaarandi