Sciweavers

2297 search results - page 302 / 460
» An Algorithm for Computing the Integral Closure
Sort
View
DAC
2009
ACM
15 years 11 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
GROUP
2009
ACM
15 years 11 months ago
Cluestr: mobile social networking for enhanced group communication
Recent technological advances foster the spreading of social software in the mobile domain. Hence, future usage patterns of mobile devices will involve more group interaction. Whi...
Reto Grob, Michael Kuhn 0002, Roger Wattenhofer, M...
BPM
2007
Springer
118views Business» more  BPM 2007»
15 years 11 months ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal
DASFAA
2006
IEEE
183views Database» more  DASFAA 2006»
15 years 10 months ago
Probabilistic Similarity Join on Uncertain Data
An important database primitive for commonly used feature databases is the similarity join. It combines two datasets based on some similarity predicate into one set such that the n...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...
ICDCS
2006
IEEE
15 years 10 months ago
Utility Optimization for Event-Driven Distributed Infrastructures
Event-driven distributed infrastructures are becoming increasingly important for information dissemination and application integration. We examine the problem of optimal resource ...
Cristian Lumezanu, Sumeer Bhola, Mark Astley