Generally, fraud risk implies any intentional deception made for financial gain. In this paper, the authors consider this risk in the field of services which support transactions with electronic money. Specifically, they apply a tool for predictive security analysis at runtime which observes process behavior with respect to transactions within ...Download Now
In today's distributed and dynamic business environment companies and their business processes are frequently subject to changes, requiring the ability to continuously evolve business processes in a flexible and dynamic way according to changing external conditions. Taking flexibility as the ability to react to changes by adaptation, it appears appropriate ...Download Now
Saving power without interfering both performance and workload is a crucial task. Different mechanisms, algorithms and strategies are presented, compared and discussed. From the live migration and consolidation of virtual machines to the creation of management frameworks which encapsulate the whole workflow. Afterwards, virtual power states which allow virtualization-management-policies to ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?