Sciweavers

177 search results - page 27 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 6 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
SIGMETRICS
2012
ACM
253views Hardware» more  SIGMETRICS 2012»
13 years 4 months ago
Characterizing continuous time random walks on time varying graphs
In this paper we study the behavior of a continuous time random walk (CTRW) on a stationary and ergodic time varying dynamic graph. We establish conditions under which the CTRW is...
Daniel R. Figueiredo, Philippe Nain, Bruno F. Ribe...
86
Voted
PODC
1996
ACM
15 years 6 months ago
Simple, Fast, and Practical Non-Blocking and Blocking Concurrent Queue Algorithms
Drawing ideas from previous authors, we present a new non-blocking concurrent queue algorithm and a new twolock queue algorithm in which one enqueue and one dequeue can proceed co...
Maged M. Michael, Michael L. Scott
KDD
2005
ACM
86views Data Mining» more  KDD 2005»
16 years 2 months ago
Probabilistic workflow mining
In several organizations, it has become increasingly popular to document and log the steps that makeup a typical business process. In some situations, a normative workflow model o...
Ricardo Silva, Jiji Zhang, James G. Shanahan
131
Voted
PE
2010
Springer
133views Optimization» more  PE 2010»
15 years 7 days ago
Positive Harris recurrence and diffusion scale analysis of a push pull queueing network
We consider a push pull queueing system with two servers and two types of jobs which are processed by the two servers in opposite order, with stochastic generally distributed proc...
Yoni Nazarathy, Gideon Weiss