Sciweavers

4447 search results - page 766 / 890
» Service Interaction Patterns
Sort
View
COMPSAC
2009
IEEE
15 years 11 months ago
System Safety Requirements as Control Structures
Along with the popularity of software-intensive systems, the interactions between system components and between humans and software applications are becoming more and more complex...
Zhe Chen, Gilles Motet
WECWIS
2009
IEEE
138views ECommerce» more  WECWIS 2009»
15 years 11 months ago
Modelling Flexible Processes with Business Objects
Mainstream business process modelling techniques promote a design paradigm wherein the activities that may be performed within a case, together with their usual execution order, f...
Guy Redding, Marlon Dumas, Arthur H. M. ter Hofste...
ICDM
2009
IEEE
97views Data Mining» more  ICDM 2009»
15 years 11 months ago
Hierarchical Probabilistic Segmentation of Discrete Events
—Segmentation, the task of splitting a long sequence of discrete symbols into chunks, can provide important information about the nature of the sequence that is understandable to...
Guy Shani, Christopher Meek, Asela Gunawardana
INFOCOM
2009
IEEE
15 years 11 months ago
OneClick: A Framework for Measuring Network Quality of Experience
—As the service requirements of network applications shift from high throughput to high media quality, interactivity, and responsiveness, the definition of QoE (Quality of Exper...
Kuan-Ta Chen, Cheng-Chun Tu, Wei-Cheng Xiao
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 11 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng