Sciweavers

915 search results - page 75 / 183
» Security in Business Process Engineering
Sort
View
DAC
2008
ACM
15 years 11 months ago
Bounded-lifetime integrated circuits
Integrated circuits with bounded lifetimes can have many business advantages. We give some simple examples of m ods to enforce tunable expiration dates for chips using nanom reliab...
Puneet Gupta, Andrew B. Kahng
INFOCOM
2008
IEEE
15 years 4 months ago
Snoogle: A Search Engine for the Physical World
—Hardware advances will allow us to embed small devices into everyday objects such as toasters and coffee mugs, thus naturally form a wireless object network that connects the ob...
Haodong Wang, Chiu Chiang Tan, Qun Li
BPM
2008
Springer
131views Business» more  BPM 2008»
14 years 12 months ago
Enhancing Web Service Composition by Means of Diagnosis
Abstract. This paper proposes a framework based on Service Oriented Architecture which integrates diagnostic services in the architecture of a composite service in order to improve...
Liliana Ardissono, Stefano Bocconi, Luca Console, ...
ICSE
2004
IEEE-ACM
15 years 10 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
ICFEM
2005
Springer
15 years 3 months ago
A Compositional Framework for Service Interaction Patterns and Interaction Flows
We provide precise high-level models for eight fundamental service interaction patterns, together with schemes for their composition into complex service-based business process int...
Alistair P. Barros, Egon Börger