1 |
H. Dresner, "Business Activity Monitoring: BAM Architecture," Gartner Symposium ITXPO, Cannes, France, 2003(11).
|
2 |
F. Camci and R. B. Chinnam, "General support vector representation machine for one-class classification of non-stationary classes," Pattern Recognition, Vol.41, No.10, pp.3021-3034. 2008.
DOI
ScienceOn
|
3 |
D. Grigori, F. Casati, M. Castellanos, U. Dayal, M. sayal, and M. C. Shan, "Business Process Intelligence," Computers in Industry, Vol.53, pp.321-343, 2004.
DOI
ScienceOn
|
4 |
A. Sharma, K. Pujari, and K. Paliwal, "Intrusion detection using text processing techniques with a kernel based similarity measure," Computers and Security, Vol.26, pp.488-495, 2007.
DOI
ScienceOn
|
5 |
S. Srinivasan, V. Krishna, and S. Holmes, "Web-log -driven business activity monitoring," IEEE Computer, Vol.38, No.3, pp.61-68. 2005.
DOI
ScienceOn
|
6 |
D. Sonnen and H. D. Morris, Businessfactor : Event-driven business performance management White paper. IDC, 2004.
|
7 |
E. Howard and Shrobe, "Model-Based Diagnosis for Information Survivability," IWSAS, pp.142-157, 2001.
|
8 |
D. Garlan, B. Schmerl, and J. Chang, "Using gauges for architecture-based monitoring and adaptation," In Proceeding of the Working Conference on Complex and Dynamic Systems Architecture, 2001(12).
|
9 |
J. Cobleig, "Containment units : a hierarchically composable architecture for adaptive system," ACM SIGSOFT Software Engineering Notes, Vol.27, No.6, pp.159-165, 2002(11).
DOI
ScienceOn
|
10 |
J. Kim, S. Park, and V. Sugumaran, "A Linguistics-Based Approach for Use Case Driven Analysis Using Goal and Scenario Authoring," NLDB 2004, LNCS 3136, Springer-Verlag, pp.159-170, 2004(6).
DOI
ScienceOn
|