Buscar
Mostrando ítems 61-70 de 151
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
AFPL2, An Abstract Language for Firewall ACLs with NAT support
(IEEE Computer Society, 2009)
The design and management of firewall ACLs is a very hard and error-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-level language with a different functionality, ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Efficient data structures for local inconsistency detection in firewall ACL updates
(SciTePress, 2009)
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices and have special features, such as management of frequent topology ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Prognosing the Compliance of Declarative Business Processes Using Event Trace Robustness
(Springer, 2014)
Several proposals have studied the compliance of execution of business process traces in accordance with a set of compliance rules. Unfortunately, the detection of a compliance violation (diagnosis) means that the ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Diagnosis basada en modelos para la depuración de software mediante técnicas simbólicas.
(Edición Digital @tres, 2002-06)
En la programación es esencial tener herramientas para la diagnosis del software que ayuden al programador y al ingeniero de desarrollo a localizar los errores. En este trabajo, proponemos una nueva aproximación que permite ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Using Distributed CSPs to Model Business Processes Agreement in Software Multiprocess
(SciTePress, 2011)
A business process consists of a set of activities which are performed in a coordination way to obtain an objective. Sometimes the definition of this objective using only a classic business processes management is not ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
(IEEE Computer Society, 2019)
Organizations execute daily activities to meet their objectives. The performance of these activities can be fundamental for achieving a business objective, but they also imply the assumption of certain security risks ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Including Qualitative Knowledge in Semiqualitative Dynamical Systems
(Springer, 1998)
A new method to incorporate qualitative knowledge in semiqualitative systems is presented. In these systems qualitative knowledge may be expressed in their parameters, initial conditions and/or vector fields. The ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Competitive Intelligence based on Social Networks for Decision Making
(SISTEDES: Ingeniería de Software y las Tecnologías de Desarrollo de Software, 2009)
In previous works a framework has been presented to extract from internet the scientific community interested in a specific topic. The process uses search engines query results and e-mails address co-occurrences to obtain ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Behavioral pattern analysis of secure migration and communications in eCommerce using cryptographic protocols on a mobile MAS platform
(IEEE Computer Society, 2005)
Mobile Multi-Agent Systems (MAS) systems can be used with real success in a growing number of eCommerce applications nowadays. Security has been identified as numerous times by different researchers as a top criterion ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Automating correctness verification of artifact-centric business process models
(Elsevier, 2015)
Context: The artifact-centric methodology has emerged as a new paradigm to support business process management over the last few years. This way, business processes are described from the point of view of the artifacts ...