Sciweavers

281 search results - page 11 / 57
» Comparing operational models of name-passing process calculi
Sort
View
XMLSEC
2003
ACM
15 years 5 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
BPM
2008
Springer
87views Business» more  BPM 2008»
15 years 1 months ago
Detecting and Resolving Process Model Differences in the Absence of a Change Log
Abstract. Business-driven development favors the construction of process modifferent abstraction levels and by different people. As a consequence, there is a demand for consolidati...
Jochen Malte Küster, Christian Gerth, Alexand...
SIGMOD
2004
ACM
166views Database» more  SIGMOD 2004»
15 years 12 months ago
Fast Computation of Database Operations using Graphics Processors
We present new algorithms on commodity graphics processors to perform fast computation of several common database operations. Specifically, we consider operations such as conjunct...
Naga K. Govindaraju, Brandon Lloyd, Wei Wang 0010,...
127
Voted
FASE
2008
Springer
15 years 1 months ago
Correctness-Preserving Configuration of Business Process Models
Abstract. Reference process models capture recurrent business operations in a given domain such as procurement or logistics. These models are intended to be configured to fit the r...
Wil M. P. van der Aalst, Marlon Dumas, Florian Got...
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 5 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas