• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 971
Next 10 →

Analyzing interacting WSBPEL processes using flexible model generation

by Niels Lohmann, Peter Massuthe, Christian Stahl, Daniela Weinberg - DATA KNOWL. ENG , 2008
"... We address the problem of analyzing the interaction between WS-BPEL processes. We present a technology chain that starts out with a WS-BPEL process and translates it into a Petri net model. On the model we decide controllability of the process (the existence of a partner process, such that both can ..."
Abstract - Cited by 34 (11 self) - Add to MetaCart
We address the problem of analyzing the interaction between WS-BPEL processes. We present a technology chain that starts out with a WS-BPEL process and translates it into a Petri net model. On the model we decide controllability of the process (the existence of a partner process, such that both

Integrating Quality of Service Aspects in Top-Down Business Process Development using WS-CDL and WS-BPEL

by Florian Rosenberg, Christian Enzi, Anton Michlmayr, Christian Platzer, Schahram Dustdar
"... Developing cross-organizational business processes is a tedious task. The partners have to agree on a common data format and meaning as well as on the Quality of Service (QoS) requirements each partner has to fulfill. The QoS requirements are typically described using Service Level Agreements (SLAs) ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
) among the partners. In this paper, we propose a top-down modeling approach for Web service based business processes to capture the functional and non-functional aspects using a choreography language (WS-CDL) which describes the message interactions among the participants. The choreography is annotated

From WS-CDL Choreography to BPEL Process Orchestration

by Jan Mendling, Michael Hafner - Journal of Enterprise Information Management (JEIM), Special Issue on MIOS Best Papers , 2008
"... CDL) is a specification for describing multi party collaboration based on Web Services from a global point of view. WS-CDL is designed to be used in conjunction with the Web Services Business Process Execution Language (WS-BPEL or BPEL). As WS-CDL is a new choreography language, there has been doubt ..."
Abstract - Cited by 17 (0 self) - Add to MetaCart
CDL) is a specification for describing multi party collaboration based on Web Services from a global point of view. WS-CDL is designed to be used in conjunction with the Web Services Business Process Execution Language (WS-BPEL or BPEL). As WS-CDL is a new choreography language, there has been

The Power of Amnesia: Learning Probabilistic Automata with Variable Memory Length

by Dana Ron, Yoram Singer, NAFTALI TISHBY - Machine Learning , 1996
"... . We propose and analyze a distribution learning algorithm for variable memory length Markov processes. These processes can be described by a subclass of probabilistic finite automata which we name Probabilistic Suffix Automata (PSA). Though hardness results are known for learning distributions gene ..."
Abstract - Cited by 226 (17 self) - Add to MetaCart
. We propose and analyze a distribution learning algorithm for variable memory length Markov processes. These processes can be described by a subclass of probabilistic finite automata which we name Probabilistic Suffix Automata (PSA). Though hardness results are known for learning distributions

Generalized linear mixed models: a practical guide for ecology and evolution.

by Benjamin M Bolker , Mollie E Brooks , Connie J Clark , Shane W Geange , John R Poulsen , M Henry , H Stevens , Jada-Simone S White - Trends in Ecology and Evolution, , 2009
"... How should ecologists and evolutionary biologists analyze nonnormal data that involve random effects? Nonnormal data such as counts or proportions often defy classical statistical procedures. Generalized linear mixed models (GLMMs) provide a more flexible approach for analyzing nonnormal data when ..."
Abstract - Cited by 183 (1 self) - Add to MetaCart
How should ecologists and evolutionary biologists analyze nonnormal data that involve random effects? Nonnormal data such as counts or proportions often defy classical statistical procedures. Generalized linear mixed models (GLMMs) provide a more flexible approach for analyzing nonnormal data when

A Model-Driven Approach for Business Processes and Test Case Generation.

by Himanshu Ghetia, Shantanu Santoki, Vairamuthu S
"... Abstract--- model-driven development approaches, business process models are used at different levels in the development process. Business process modeling is one of the most important methods in business process management. It is used for better understanding of business concerns and communication ..."
Abstract - Add to MetaCart
interaction semantics relevant stereotypes. With a set of model mapping patterns, we can generate a WS-BPEL business process model and a process interaction semantics file from each UML 2.0 process model. Our approach can also be applied for generating process models in other business process modeling

A critical role for the right fronto-insular cortex in switching between central-executive and default-mode networks.

by Devarajan Sridharan , † ‡ , Daniel J Levitin , Vinod Menon - Proc Natl Acad Sci USA , 2008
"... Cognitively demanding tasks that evoke activation in the brain's central-executive network (CEN) have been consistently shown to evoke decreased activation (deactivation) in the default-mode network (DMN). The neural mechanisms underlying this switch between activation and deactivation of larg ..."
Abstract - Cited by 178 (1 self) - Add to MetaCart
events in the environment. Recent research suggests that the human brain is intrinsically organized into distinct functional networks that support these processes (1-4). Analysis of resting-state functional connectivity, using both model-based and model-free approaches, has suggested the existence

Integrality and Separability of Input Devices

by Robert J. K. Jacob, Linda E. Sibert, Daniel C. Mcfarlane, M. Preston Mullen - ACM Transactions on Computer-Human Interaction , 1994
"... Current input device taxonomies and other frameworks typically emphasize the mechanical structure of input devices. We suggest that selecting an appropriate input device for an interactive task requires looking beyond the physical structure of devices to the deeper perceptual structure of the task, ..."
Abstract - Cited by 159 (5 self) - Add to MetaCart
of the device. We conducted an experiment in which subjects performed two tasks with different perceptual structures, using two input devices with correspondingly different control structures, a three-dimensional tracker and a mouse. We analyzed both speed and accuracy, as well as the trajectories generated

Interactive Demo: Using CZSaw to Analyze Entities in Collections

by Victor Chen, Dustin Dunsmuir, Nazanin Kadivar, Eric Lee, Jeffrey Guenther, Saba Alimadadi Jani, John Dill, Chris Shaw, Robert Woodbury, Maureen Stone, Cheryl Qian
"... CZSaw [1] is a visual analytics tool for sense-making across entities, entity collections, and relations with a focus on augmenting the analysis process. It uses a variety of flexible data visualizations to represent, explore, and compute networks of entities and relations from different perspective ..."
Abstract - Add to MetaCart
perspectives. CZSaw is designed to provide a replayable record of the analysis process and to generate a reusable model of the analysis logic, structured as a dependency graph. To support these goals, semantically meaningful interactions are captured into a script. Replaying this script replays the analysis

DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure

by Juan R. Hernández, Fernando Pérez-González, Martin Amado - IEEE TRANS. ON IMAGE PROCESSING , 2000
"... In this paper, a spread-spectrum-like discrete cosine transform domain (DCT domain) watermarking technique for copyright protection of still digital images is analyzed. The DCT is applied in blocks of 8 8 pixels as in the JPEG algorithm. The watermark can encode information to track illegal misuses. ..."
Abstract - Cited by 138 (4 self) - Add to MetaCart
. For flexibility purposes, the original image is not necessary during the ownership verification process, so it must be modeled by noise. Two tests are involved in the ownership verification stage: watermark decoding, in which the message carried by the watermark is extracted, and watermark detection, which
Next 10 →
Results 1 - 10 of 971
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University