Buscar
Mostrando ítems 1-10 de 139
Ponencia
Towards Automatic Code Generation for EAI Solutions using DSL Tools
(Asociación de Ingeniería del Software y Tecnologías de Desarrollo de Software (SISTEDES), 2009)
Current companies count on heterogeneous information technology applications to perform their activities. More often than not, they need to be integrated so that the data they manage is kept in sync or to implement ...
Artículo
Generación Semiautomática de Recursos
(Sociedad Española para el Procesamiento del Lenguaje Natural (SEPLN), 2007)
Los resultados de muchos algoritmos que se aplican en tareas de procesamiento del lenguaje natural dependen de la disponibilidad de grandes recursos lingüíısticos, de los que extraen el conocimiento necesario para ...
Artículo
Fault Tolerance Framework using Model-Based Diagnosis: Towards Dependable Business Processes
(International Academy, Research, and Industry Association (IARIA), 2011)
Several reports indicate that one of the most important business priorities is the improvement of business and IT management. Management and automation of business processes have become essential tasks within IT ...
Artículo
PolaritySpam: Propagating Content-based Information Through a Web-Graph to Detect Web Spam
(ICIC International, 2012)
Spam web pages have become a problem for Information Retrieval systems due to the negative effects that this phenomenon can cause in their results. In this work we tackle the problem of detecting these pages with a ...
Artículo
Diagnosing correctness of semantic workflow models
(Elsevier, 2013)
To model operational business processes in an accurate way, workflow models need to reference both the control flow and dataflow perspectives. Checking the correctness of such workflow models and giving precise feedback ...
Ponencia
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets
(IEEE Computer Society, 2008)
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACLs could have inconsistencies, allowing traffic that should be denied or vice versa. In this paper, we analyze ...
Artículo
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
(Elsevier, 2013)
Context: The use of Business Process Management Systems (BPMS) has emerged in the IT arena for the automation of business processes. In the majority of cases, the issue of security is overlooked by default in these systems, ...
Artículo
NDT-Suite, una solución práctica para el uso de NDT
(Asociación Española para la Gobernanza, la Gestión y la Medición de las Tecnologías de la Información (AEMES), 2011)
The importance of software engineering is well established and accepted by the research community. However, it is still common to find reticence in the business world against the discipline. There are plenty of proposals ...
Ponencia
A Novel Approach to Web Information Extraction
(Springer, 2015)
Business Intelligence requires the acquisition and aggrega tion of key pieces of knowledge from multiple sources in order to provide valuable information to customers. The Web is the largest source of infor mation nowadays. ...
Ponencia
Subgroup Discovery for Defect Prediction
(Springer, 2011-09)