Sciweavers

2250 search results - page 137 / 450
» Authorizing applications in singularity
Sort
View
JWSR
2008
145views more  JWSR 2008»
14 years 10 months ago
An Access-Control Framework for WS-BPEL
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Federica Paci, Elisa Bertino, Jason Crampton
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
14 years 10 months ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
FCT
2009
Springer
15 years 4 months ago
On Random Betweenness Constraints
Despite of their applicability betweennness constraints have (to the author’s knowledge) hardly been considered from the random structures point of view. They are essentially diï...
Andreas Goerdt
ICIDS
2009
Springer
15 years 4 months ago
Emohawk: Searching for a "Good" Emergent Narrative
We report on the progress we have achieved in development of Emohawk, a 3D virtual reality application with an emergent narrative for teaching high-school students and undergraduat...
Cyril Brom, Michal Bída, Jakub Gemrot, Rudo...
DEXA
2007
Springer
144views Database» more  DEXA 2007»
15 years 4 months ago
Cooperative Data Management for XML Data
Emerging non-standard applications like the production of high-quality spatial sound pose new challenges to data management. Beside the need for a flexible transactional managemen...
Katja Hose, Kai-Uwe Sattler