Sciweavers

5577 search results - page 134 / 1116
» E2K Technology and Implementation
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 8 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
RE
2002
Springer
14 years 11 months ago
Requirements-Level Semantics and Model Checking of Object-Oriented Statecharts
perfect technology assumption, which abstracts from limitations imposed by an implementation. Statecharts describe object life cycles. Our semantics includes synchronous and asynch...
Rik Eshuis, David N. Jansen, Roel Wieringa
IEEECIT
2010
IEEE
14 years 9 months ago
Discussion on the Teaching Reform of Single-chip Computer Base on Mode CDIO at Vocational College
—The conventional teaching model is broken in Mode CDIO, in which, with the carrier of project, the educational idea based on project-learning and the principle of teaching integ...
Baiqing Zhou, Xiuhui Kui, Youtian Qu
OTM
2010
Springer
14 years 9 months ago
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
In this paper, we present generic algorithms to ensure the consistency of mutual-exclusion and binding constraints in a business process context. We repeatedly identified the need...
Mark Strembeck, Jan Mendling
CIKM
2010
Springer
14 years 9 months ago
Facetedpedia: enabling query-dependent faceted search for wikipedia
Facetedpedia is a faceted search system that dynamically discovers query-dependent faceted interfaces for Wikipedia search result articles. In this paper, we give an overview of F...
Ning Yan, Chengkai Li, Senjuti Basu Roy, Rakesh Ra...