Wang, Jiacun, 1963-
Person
Found in 8 Collections and/or Records:
Modeling and enacting inter-organizational workflows, 2007
Item — Call number MU Thesis Tar
Identifier: b2087658
Abstract
The events of September 11th, 2001 have demonstrated the need for better preparedness in the event of another terrorist attack here in the United States. It is well demonstrated that problems of response and the delivery of services during the hours and days immediately following the attacks at the World Trade Center were due, in part, to poorly integrated workflows. We must learn from the mistakes and deficiencies of the past, while bringing to bear the latest advances in the field, when...
Dates:
2007
Querying semantic data with natural language, 2015
Item — Call number MU Thesis Kir
Identifier: b7636895
Abstract
Searching through semantic data using SPARQL requires expert knowledge and thus remains out of reach for casual users. In this work, we explore the development of natural language interfaces for semantic data. This work looks at a number of approaches towards this goal as well as providing a new approach. Our system works like a natural language compiler and handles a limited set of natural language questions which, though narrow in scope, have complex semantics that other systems would...
Dates:
2015
Real-time systems scheduling tool design and development, 2005
Item — Call number MU Thesis Ghi
Identifier: b2088402
Abstract
Real-time systems (RTS) scheduling is an important component in real-time systems education and research. Dozens of well-known scheduling algorithms are introduced in many textbooks. It is desireable that, given a set of real-time task specifications, a dedicated software tool carries out the schedulability analysis and schedule generation. This thesis presents the design and development of such a tool.
The tool implements some most popular RTS scheduling algrorithms, such as the...
Dates:
2005
Resource and time-constrained workflow modeling, analyzing and tool development, 2009
Item — Call number MU Thesis Jia
Identifier: b2195472
Scope and Contents
From the Collection:
The collection consists of theses written by students enrolled in the Monmouth University graduate Software Engineering program. The holdings are bound print documents that were submitted in partial fulfillment of requirements for the Master of Science degree.
Dates:
2009
Resource-constrained and decision support workflow modeling and tool development, 2007
Item — Call number MU Thesis Tsa
Identifier: b2087674
Abstract
This thesis extends Workflow Intuitive Formal Approach (WIFA), an intuitive yet formal workflow formalism introduced to satisfy the workflow management needs of incident command systems, to take resources into account when modeling and enacting workflows. Resources can become important decision factors when combined with control flow information. In many situations, business processes are constrained by scarce resources. The lack of resources can cause contention, the need for some tasks...
Dates:
2007
Security characteristics of internet username and password authentication systems : an analysis of the strengths and weaknesses of current and future authentication systems, 2012
Item — Call number MU Thesis Car
Identifier: b4175556
Abstract
Web authentication systems use username and password mechanisms as the primary control for authorizing access to sensitive data and other resources of the Internet. While most Internet users view authentication systems as secure and usable, much research shows and many security experts believe that this view and the current authentication systems promote bad habits that result in loss of security, which poses real dangers to the Internet. Because site-centric authentication models result...
Dates:
2012
Web-based resource-constrained workflow enactment tool development, 2008
Item — Call number MU Thesis Vid
Identifier: b2090067
Abstract
This thesis presents a web-based enactment tool for workflows built using a WIFA tool or a resource-constrained WIFA tool. WIFA is an intutiive yet formal workflow formalism introduced to satisfy the workflow management needs of incident command systems. Resource-constrained WIFA extends WIFA by taking resources into account when modeling and enacting workflows. The existing stand-alone tools developed by WIFA or resource-constrained WIFA are good for workflow editing and verification....
Dates:
2008
Workflow management tool support for incident command systems, 2005
Item — Call number MU Thesis Sto
Identifier: b2087654
Abstract
The dyanamic nature of incident command systems and their requirement for high flexibility raise a challenge to the research and implementation of workflows. The signficance of applying formal approaches to the modeling and analysis of workflows has been well recognized and several such approaches have been proposed. However, these approaches require users to master considerable knowledge of the particular formalisms, which impacts their application on a larger scale. To address these...
Dates:
2005