Sciweavers

1040 search results - page 159 / 208
» Controlling Aspect Reentrancy
Sort
View
CCGRID
2004
IEEE
15 years 4 months ago
Search performance analysis and robust search algorithm in unstructured peer-to-peer networks
Recently Peer-to-Peer networks (P2P) have gained great attention and popularity. One key challenging aspect in a P2P resource sharing environment is an efficient searching algorit...
Tsungnan Lin, Hsinping Wang, Jianming Wang
104
Voted
CSFW
2004
IEEE
15 years 4 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
102
Voted
BPM
2006
Springer
133views Business» more  BPM 2006»
15 years 4 months ago
Experiences in Enhancing Existing BPM Tools with BPEL Import and Export
The Business Process Execution Language for Web Services (BPEL) has become a de-facto standard for executable process specifications. The broad industry acceptance of BPEL forces w...
Jan Mendling, Kristian Bisgaard Lassen, Uwe Zdun
CAISE
2006
Springer
15 years 4 months ago
Deviational Analyses for Validating Regulations on Real Systems
Deviational analysis is a traditional way of exploring the safety of systems. The results of deviational analysis contribute to traditional safety cases and safety arguments. We ex...
Fiona Polack, Thitima Srivatanakul, Tim Kelly, Joh...
CIA
2006
Springer
15 years 4 months ago
Risk-Bounded Formation of Fuzzy Coalitions Among Service Agents
Cooperative autonomous agents form coalitions in order to share and combine resources and services to efficiently respond to market demands. With the variety of resources and servi...
Bastian Blankenburg, Minghua He, Matthias Klusch, ...