Sciweavers

2704 search results - page 515 / 541
» Constraint Management in Engineering of Complex Information ...
Sort
View
IEEEARES
2006
IEEE
15 years 5 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
CERA
2002
134views more  CERA 2002»
14 years 11 months ago
Graph Grammar Based Product Family Modeling
: Many industries are shifting from mass production to mass customization, which demands quick response to the needs of individual customers with high quality and low costs. The de...
Xuehong Du, Jianxin Jiao, Mitchell M. Tseng
82
Voted
EUROSYS
2009
ACM
15 years 8 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ con...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
PDCAT
2005
Springer
15 years 5 months ago
Optimal Routing in a Small-World Network
Recently a bulk of research [14, 5, 15, 9] has been done on the modelling of the smallworld phenomenon, which has been shown to be pervasive in social and nature networks, and eng...
Jianyang Zeng, Wen-Jing Hsu
PODS
2011
ACM
163views Database» more  PODS 2011»
14 years 2 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...