Sciweavers

231 search results - page 15 / 47
» Active Preservation
Sort
View
ICWS
2009
IEEE
14 years 7 months ago
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes
The WS-BPEL specification focuses on business processes the activities of which are assumed to be interactions with Web services. However, WS-BPEL processes go beyond the orchestr...
Federica Paci, Rodolfo Ferrini, Elisa Bertino
STOC
2007
ACM
140views Algorithms» more  STOC 2007»
15 years 10 months ago
On the submodularity of influence in social networks
We prove and extend a conjecture of Kempe, Kleinberg, and Tardos (KKT) on the spread of influence in social networks. A social network can be represented by a directed graph where...
Elchanan Mossel, Sébastien Roch
ASIACRYPT
2000
Springer
15 years 1 months ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng
75
Voted
JUCS
2010
137views more  JUCS 2010»
14 years 8 months ago
A Model for Capturing and Managing Software Engineering Knowledge and Experience
: During software development projects there is always a particular working “product” that is generated but rarely managed: the knowledge and experience that team members acqui...
Gerardo Matturro, Andrés Silva
ECTEL
2006
Springer
15 years 1 months ago
Socially-Aware Informal Learning Support: Potentials and Challenges of the Social Dimension
With increasingly conceiving learning as a social activity, technological support must become more aware of the social context of the individual in order to be able to provide adeq...
Simone Braun, Andreas Schmidt