Sciweavers

618 search results - page 111 / 124
» An Approach to Discover Dependencies between Service Operati...
Sort
View
CSFW
2009
IEEE
15 years 1 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
ECIS
2004
14 years 10 months ago
Employee development strategies in the B2C banking environment: Two Australian case studies
The implementation of technology and, in particular, eCommerce technologies has had unforeseen consequences for the relationship between managers and employees. To be able to oper...
Yvette Blount, Tanya Castleman, Paula M. C. Swatma...
EOR
2008
78views more  EOR 2008»
14 years 9 months ago
Managing the overflow of intensive care patients
Abstract. Many hospitals in the Netherlands are confronted with capacity problems at their Intensive Care Units (ICUs) resulting in cancelling operations, overloading the staff wit...
Nelly Litvak, Marleen van Rijsbergen, Richard J. B...
ITIIS
2010
128views more  ITIIS 2010»
14 years 8 months ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim
GIS
2010
ACM
14 years 7 months ago
Kernelized map matching
Map matching is a fundamental operation in many applications such as traffic analysis and location-aware services, the killer apps for ubiquitous computing. In the past, several m...
Ahmed Jawad, Kristian Kersting