The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The existing workflow modeling languages have some limitations and drawbacks. The aim is to introduce a new workflow modeling language based on stochastic activity networks (SANs). SANs are a powerful extension of Petri nets, which have been used in a wide range of applications. SAN-based workflow modeling language (SWML) has some high-level modeling primitives for easily modeling workflow patterns...
The aim has been to develop a modeling tool for coloured stochastic activity networks (CSANs). CSANs are a high-level extension of stochastic activity networks (SANs) which provide features for hierarchical modeling and data manipulation by introducing coloured place and macro activity. SDES is an abstract unified description for stochastic discrete-event systems. PDETool is a multi-formalism modeling...
The aim is to develop a suitable method for quantifying security. We use stochastic modeling techniques for this purpose. An intrusion process is considered as a series of elementary attack phases and at each phase the interactions between the attacker and the system are analyzed rigorously. It is assumed that a typical attacker needs some time to perform an elementary attack phase. On the other hand,...
Security quantification is a topic that has gained a lot of interest in the research community during the recent years. In this paper, a new method is proposed for modeling and quantifying attack effects on a computer system. In this work, intrusion process is considered as atomic sequential steps. Each atomic step changes the current system state. On the other hand, system tries to prevent and detect...
Call centers, or their contemporary successors, contact centers, are the preferred and prevalent way for many companies to communicate with their customers. The call center industry is thus vast and rapidly expanding in terms of both workforce and economic scope. It enjoys an annual growth rate of 20% and, overall, more than half of the business transactions are conducted over the phone. The design...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.