You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “m...
The refereed proceedings of the International Conference on Business Process Management, BPM 2003, held in Eindhoven, The Netherlands, in June 2003. The 25 revised full papers presented together with an introductory survey article were carefully reviewed and selected from 77 submissions. Among the issues addressed are Web services, workflow modeling, business process modeling, collaborative computing, computer-supported collaborative work, workflow patterns, business process engineering, business process patterns, workflow systems, Petri nets, process services, business process reengineering, and business process management tools.
Gilbert Müller introduces the foundations of Business Process Management as well as Case-based Reasoning and presents a novel approach to assist the complex, time-consuming, and error-prone task of workflow modeling. By means of methods from artificial intelligence, in particular from the field of Case-based Reasoning, he shows how workflows can be automatically constructed according to a query specified by the user. Thus, the modeling process can be supported substantially, which addresses a highly relevant problem in many workflow domains.
Automated planning is known to be computationally hard in the general case. Propositional planning is PSPACE-complete and first-order planning is undecidable. One method for analyzing the computational complexity of planning is to study restricted subsets of planning instances, with the aim of differentiating instances with varying complexity. We use this methodology for studying the computational complexity of planning. Finding new tractable (i.e. polynomial-time solvable) problems has been a particularly important goal for researchers in the area. The reason behind this is not only to differentiate between easy and hard planning instances, but also to use polynomial-time solvable instances...
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating inte...
Deception offers a broadly accessible overview of state-of-the-art research on lies, trickery, cheating, and shams by leading experts in the natural and social sciences, as well as computing, the humanities, and the military.
Life and works of Madhusudan Das, 1848-1934, a nationalist from Orissa, India; includes selections of his writings and speeches.
None
Papers from a June 2002 workshop identify and explore technical and technology management issues surrounding e-commerce for the Internet. Papers are grouped in sections on WebServices and XML-based protocols, business processes and workflow technology, e-markets, Internet infrastructure, wireless infrastructure and the Web, and e- commerce applications. Some applications and methods discussed include pricing of bundled information goods, a secure protocol for disseminating data to subscribers via IP multicast, clustering Web accelerators, and dynamic refinement of table summarization for m- commerce. Other topics are mediator systems in e-commerce applications, MQML-message queuing markup language, and characterization of e-commerce traffic. There is no subject index. Annotation copyrighted by Book News, Inc., Portland, OR.