Sciweavers

462 search results - page 68 / 93
» Traceability-Based Change Awareness
Sort
View
82
Voted
ACSAC
2000
IEEE
15 years 2 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
79
Voted
CAISE
2009
Springer
15 years 2 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
93
Voted
DSN
2007
IEEE
15 years 2 months ago
Performability Models for Multi-Server Systems with High-Variance Repair Durations
We consider cluster systems with multiple nodes where each server is prone to run tasks at a degraded level of service due to some software or hardware fault. The cluster serves t...
Hans-Peter Schwefel, Imad Antonios
BPM
2008
Springer
144views Business» more  BPM 2008»
15 years 5 days ago
Supporting Flexible Processes through Recommendations Based on History
Abstract. In today's fast changing business environment flexible Process Aware Information Systems (PAISs) are required to allow companies to rapidly adjust their business pro...
Helen Schonenberg, Barbara Weber, Boudewijn F. van...
105
Voted
EUROPAR
2008
Springer
14 years 12 months ago
Transparent Mobile Middleware Integration for Java and .NET Development Environments
Developing a distributed application for mobile resource constrained devices is a difficult and error-prone task that requires awareness of several system-level details (e.g., faul...
Edgar Marques, Luís Veiga, Paulo Ferreira