Sciweavers

1410 search results - page 252 / 282
» An operational approach to the design of workflow systems
Sort
View
DSN
2005
IEEE
15 years 7 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
MMM
2005
Springer
148views Multimedia» more  MMM 2005»
15 years 7 months ago
Paving the Last Mile for Multi-Channel Multimedia Presentation Generation
Users of multimedia applications today are equipped with a variety of different (mobile) devices that each come with different operating systems, memory and CPU capabilities, netw...
Ansgar Scherp, Susanne Boll
108
Voted
EGC
2005
Springer
15 years 7 months ago
XDTM: The XML Data Type and Mapping for Specifying Datasets
We are concerned with the following problem: How do we allow a community of users to access and process diverse data stored in many different formats? Standard data formats and da...
Luc Moreau, Yong Zhao, Ian T. Foster, Jens-S. V&ou...
MIDDLEWARE
2004
Springer
15 years 6 months ago
Enabling collaborative adaptation across legacy components
Software frequently needs to adapt its behavior at run time to respond to changes in its execution environment. Different software components may use different approaches to adap...
Zhenxiao Yang, Zhinan Zhou, Betty H. C. Cheng, Phi...
JCDL
2003
ACM
136views Education» more  JCDL 2003»
15 years 6 months ago
The OAI-PMH Static Repository and Static Repository Gateway
Although the OAI-PMH specification is focused on making it straightforward for data providers to expose metadata, practice shows that in certain significant situations deployment ...
Patrick Hochstenbach, Henry N. Jerez, Herbert Van ...