Sciweavers

5312 search results - page 970 / 1063
» Business Process Management Systems
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 9 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
SAC
2005
ACM
15 years 9 months ago
Efficient placement and routing in grid-based networks
This paper presents an efficient technique for placement and routing of sensors/actuators and processing units in a grid network. Our system requires an extremely high level of ro...
Roozbeh Jafari, Foad Dabiri, Bo-Kyung Choi, Majid ...
SAC
2005
ACM
15 years 9 months ago
Mining concept associations for knowledge discovery in large textual databases
In this paper, we describe a new approach for mining concept associations from large text collections. The concepts are short sequences of words that occur frequently together acr...
Xiaowei Xu, Mutlu Mete, Nurcan Yuruk
ATAL
2005
Springer
15 years 9 months ago
Formalization of a voting protocol for virtual organizations
A voting protocol for decision-making in virtual organizations is presented. In an agent-based virtual organization the functions of formation, management and dissolution of the o...
Jeremy V. Pitt, Lloyd Kamara, Marek J. Sergot, Ale...
CIKM
2005
Springer
15 years 9 months ago
Detecting changes on unordered XML documents using relational databases: a schema-conscious approach
Several relational approaches have been proposed to detect the changes to XML documents by using relational databases. These approaches store the XML documents in the relational d...
Erwin Leonardi, Sourav S. Bhowmick