摘要:
In one non-limiting aspect thereof the exemplary embodiments of this invention provide a computer-implemented method to make a decision as to whether a particular claim submitted by a first economic agent for approval by a second economic agent may be a fraudulent claim. The method includes applying statistics to information representing a proxy of fraud to generate an estimate of a probability of fraud for the particular claim; updating the estimate of the probability of fraud using decision making under uncertainty that is based at least in part on at least one type of additional information; applying game theory to the updated estimate of the probability of fraud to model strategic behavior between the first and second economic agents; and generating a recommendation to audit or not audit the particular claim. The proxy of fraud may be imperfect proxy of fraud, such as is found in nascent industries.
摘要:
A computer-implemented method (and structure) for creating a service client for a service and a role includes exercising an application programming interface (API) of the service to perform activities of the role, discovering data and behavioral models exposed by the service during this exercise, and configuring a selected set of graphical user interface (GUI) components to represent the discovered data and behavioral models for the activities of the role.
摘要:
A computer-implemented method supporting collaborative product development. A plurality of artifacts associated with the collaborative product development is maintained under revision control in a first repository. Each artifact has a plurality of lifecycle states and each artifact is associated with a first finite state machine (FSM) that defines lifecycle state transitions for the artifacts. A plurality of artifact tuples associated with the collaborative product development is maintained under revision control in a second repository. At least one artifact tuple is comprised of at least one access information providing access to at least one of said plurality of artifacts in the first repository. Each artifact tuple has a plurality of lifecycle states and each artifact tuple is associated with a second finite state machine (FSM) that defines lifecycle state transitions for the artifact tuples. There exists a set of lifecycle state transition mappings which maps all valid lifecycle state transitions for an artifact with desired lifecycle state transitions for an artifact tuple and all valid lifecycle state transitions for an artifact tuple with desired lifecycle state transitions for an artifact. A workflow process relating to an evolution of an artifact or artifact tuple is expressed through sequencing of one or more members of the said lifecycle state transition mappings set.
摘要:
A plurality of artifacts, in a plurality of repositories, are maintained under revision control. A plurality of artifact tuples, in another repository, are maintained under revision control. At least one first artifact tuple comprise first information providing access to at least one of the artifacts. At least one second artifact tuple comprises second information providing access to at least one other artifact tuple. Each of the artifact tuples are associated with at least one of a plurality of product development processes. An apparatus comprises a plurality of repositories, each maintaining under revision control a plurality of artifacts and another repository that maintains under revision control a plurality of artifact tuples. A workflow process is adapted to allow users to associate each of the artifact tuples with at least one of a plurality of product development processes.
摘要:
A computer-implemented method, program and apparatus supporting collaborative product development, that includes, maintaining under revision control, in a first repository, a plurality of artifacts, and in another repository, a plurality of artifact tuples. At least one first artifact tuple including first access information providing access to at least one of the plurality of artifacts, and at least one second artifact tuple including second access information providing access to at least one other of the plurality of artifact tuples. The method, program and apparatus also maintains under revision control, at least one workflow activity description and at least one artifact configuration selection rule. The method, program and apparatus further associates the workflow activity description with at least one of the plurality of artifact tuples, and associates the workflow activity description with the at least one artifact configuration selection rules.
摘要:
A plurality of artifacts, in a plurality of repositories, are maintained under revision control. A plurality of artifact tuples, in another repository, are maintained under revision control. At least one first artifact tuple comprise first information providing access to at least one of the artifacts. At least one second artifact tuple comprises second information providing access to at least one other artifact tuple. Each of the artifact tuples are associated with at least one of a plurality of product development processes. An apparatus comprises a plurality of repositories, each maintaining under revision control a plurality of artifacts and another repository that maintains under revision control a plurality of artifact tuples. A workflow process is adapted to allow users to associate each of the artifact tuples with at least one of a plurality of product development processes.
摘要:
A computer-implemented method supporting collaborative product development. A plurality of artifacts associated with the collaborative product development is maintained under revision control in a first repository. Each artifact has a plurality of lifecycle states and each artifact is associated with a first finite state machine (FSM) that defines lifecycle state transitions for the artifacts. A plurality of artifact tuples associated with the collaborative product development is maintained under revision control in a second repository. At least one artifact tuple is comprised of at least one access information providing access to at least one of said plurality of artifacts in the first repository. Each artifact tuple has a plurality of lifecycle states and each artifact tuple is associated with a second finite state machine (FSM) that defines lifecycle state transitions for the artifact tuples. There exists a set of lifecycle state transition mappings which maps all valid lifecycle state transitions for an artifact with desired lifecycle state transitions for an artifact tuple and all valid lifecycle state transitions for an artifact tuple with desired lifecycle state transitions for an artifact. A workflow process relating to an evolution of an artifact or artifact tuple is expressed through sequencing of one or more members of the said lifecycle state transition mappings set.
摘要:
A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using static analyses; for automatically evaluating existing security policies; for detecting problems in code; in a run-time execution environment in which a software program is executing. The method comprises: implementing reflection objects for identifying program points in the executing program where authorization failures have occurred in response to the program's attempted access of resources requiring authorization; displaying instances of identified program points via a user interface, the identified instances being user selectable; for a selected program point, determining authorization and privileged-code requirements for the access restricted resources in real-time; and, enabling a user to select, via the user interface, whether a required authorization should be granted, wherein local system, fine-grained access of resources requiring authorizations is provided.
摘要:
A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using static analyses; for automatically evaluating existing security policies; for detecting problems in code; in a run-time execution environment in which a software program is executing. The method comprises: implementing reflection objects for identifying program points in the executing program where authorization failures have occurred in response to the program's attempted access of resources requiring authorization; displaying instances of identified program points via a user interface, the identified instances being user selectable; for a selected program point, determining authorization and privileged-code requirements for the access restricted resources in real-time; and, enabling a user to select, via the user interface, whether a required authorization should be granted, wherein local system, fine-grained access of resources requiring authorizations is provided.
摘要:
A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using static analyses; for automatically evaluating existing security policies; for detecting problems in code; in a run-time execution environment in which a software program is executing. The method comprises: implementing reflection objects for identifying program points in the executing program where authorization failures have occurred in response to the program's attempted access of resources requiring authorization; displaying instances of identified program points via a user interface, the identified instances being user selectable; for a selected program point, determining authorization and privileged-code requirements for the access restricted resources in real-time; and, enabling a user to select, via the user interface, whether a required authorization should be granted, wherein local system, fine-grained access of resources requiring authorizations is provided.