Sciweavers

3976 search results - page 29 / 796
» Semantic Enterprise Technologies
Sort
View
IAW
2003
IEEE
15 years 7 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
SMC
2010
IEEE
151views Control Systems» more  SMC 2010»
15 years 9 days ago
A situated approach to enterprise architecture management
Abstract—Today’s enterprises are confronted with a challenging environment that demands continuous transformations. Globalized markets, disruptive technological innovations, an...
Sabine Buckl, Christian M. Schweda, Florian Matthe...
RULEML
2007
Springer
15 years 8 months ago
The OO jDREW Engine of Rule Responder: Naf Hornlog RuleML Query Answering
Abstract. Rule Responder is an intelligent multi-agent system for collaborative teams and virtual communities that uses RuleML as its rule interchange format. The system allows the...
Benjamin Larry Craig
GCC
2005
Springer
15 years 7 months ago
Characterizing Services Composeability and OWL-S Based Services Composition
Grid has emerged as a new paradigm for integration within dynamic virtual enterprises. Given a service-oriented Grid environment, more complex, value-added sophisticated services a...
Zhonghua Yang, Jing-Bing Zhang, Jiao Tao, Robert K...
CAISE
2008
Springer
15 years 3 months ago
Formal Modeling and Discrete-Time Analysis of BPEL Web Services
Abstract. Web services are increasingly used for building enterprise information systems according to the Service Oriented Architecture (Soa) paradigm. We propose in this paper a t...
Radu Mateescu, Sylvain Rampacek