Sciweavers

3555 search results - page 603 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
DEXAW
2002
IEEE
151views Database» more  DEXAW 2002»
15 years 6 months ago
Domain-Independent eNegotiation Design: Prospects, Methods, and Challenges
Designing electronic markets is still a rather intricate process. eNegotiation - and thereby trading rules - embody the core of the institution ”electronic market”. Although s...
Dirk Neumann, Christof Weinhardt
ICEIS
2002
IEEE
15 years 6 months ago
The AEX Method and Its Instrumentation
: We aim at elaborating a decision support system to manage concrete experience, using Artificial Intelligence methods, such as Case-Based Reasoning. We target any organization tha...
Sabine Delaître, Alain Giboin, Sabine Moisan
DESRIST
2009
Springer
132views Education» more  DESRIST 2009»
15 years 6 months ago
Measuring information volatility in a health care information supply chain
We propose a measure of reliability called information volatility (IV) to complement Business Intelligence tools when considering aggregated data or when observing trends. Two typ...
Monica Chiarini Tremblay, Donald J. Berndt, Alan R...
WSC
2008
15 years 3 months ago
A Pi-calculus formalism for discrete event simulation
This paper presents PiDES, a formalism for discrete event simulation based on Pi-calculus. PiDES provides a rigorous semantics of behavior modeling and coordination for simulation...
Jianrui Wang, Richard A. Wysk
ASWEC
2008
IEEE
15 years 3 months ago
A Framework for Over the Air Provider-Initiated Software Deployment on Mobile Devices
Abstract-- While mobile users want to obtain software anywhere and anytime without the knowledge of software availability in advance, software providers want to deploy their softwa...
Chuong Cong Vo, Torab Torabi