Sciweavers

4150 search results - page 366 / 830
» A Practical Approach to Model Extension
Sort
View
DASFAA
2004
IEEE
158views Database» more  DASFAA 2004»
15 years 8 months ago
A Cost Model for Spatial Intersection Queries on RI-Trees
Abstract. The efficient management of interval sequences represents a core requirement for many temporal and spatial database applications. With the Relational Interval Tree (RI-tr...
Hans-Peter Kriegel, Martin Pfeifle, Marco Pöt...
AC
2003
Springer
15 years 8 months ago
Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management
Abstract. Over the last decade there has been a shift from "data-aware" information systems to "process-aware" information systems. To support business processe...
Wil M. P. van der Aalst
CASCON
2008
137views Education» more  CASCON 2008»
15 years 6 months ago
Automating SLA modeling
Service Level Agreements (SLAs) define the level of service that a service provider must deliver. An SLA is a contract between service provider and consumer, and includes appropri...
Tony Chau, Vinod Muthusamy, Hans-Arno Jacobsen, El...
JCISE
2002
117views more  JCISE 2002»
15 years 4 months ago
Memory Analysis of Solid Model Representations for Heterogeneous Objects
Methods to represent and exchange parts consisting of Functionally Graded Material (FGM) for Solid Freeform Fabrication (SFF) with Local Composition Control (LCC) are evaluated ba...
Todd R. Jackson, Wonjoon Cho, Nicholas M. Patrikal...
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 4 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...