Sciweavers

1410 search results - page 234 / 282
» An operational approach to the design of workflow systems
Sort
View
ER
2004
Springer
169views Database» more  ER 2004»
15 years 7 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
HICSS
2012
IEEE
324views Biometrics» more  HICSS 2012»
13 years 9 months ago
Extending BPMN for Business Activity Monitoring
—Real-time access to key performance indicators is necessary to ensure timeliness and effectiveness of operational business processes. The concept of Business Activity Monitoring...
Jan-Philipp Friedenstab, Christian Janiesch, Marti...
USS
2004
15 years 2 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
FCCM
2004
IEEE
118views VLSI» more  FCCM 2004»
15 years 5 months ago
Virtual Memory Window for a Portable Reconfigurable Cryptography Coprocessor
Reconfigurable System-on-Chip (SoC) platforms that incorporate hard-core processors surrounded by large amounts of FPGA are today commodities: the reconfigurable logic is often us...
Miljan Vuletic, Laura Pozzi, Paolo Ienne
VEE
2010
ACM
204views Virtualization» more  VEE 2010»
15 years 1 months ago
Energy-efficient storage in virtual machine environments
Current trends in increasing storage capacity and virtualization of resources combined with the need for energy efficiency put a challenging task in front of system designers. Pre...
Lei Ye, Gen Lu, Sushanth Kumar, Chris Gniady, John...