Sciweavers

1161 search results - page 164 / 233
» Kinetic Dependence Graphs
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
14 years 11 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
JSA
2008
124views more  JSA 2008»
14 years 10 months ago
Processor array architectures for flexible approximate string matching
In this paper, we present linear processor array architectures for flexible approximate string matching. These architectures are based on parallel realization of dynamic programmi...
Panagiotis D. Michailidis, Konstantinos G. Margari...
DSS
2007
94views more  DSS 2007»
14 years 10 months ago
A formal modeling approach for supply chain event management
: As supply chains become more dynamic it is important to be able to model them formally as business processes. In particular, there is a need for a sense and respond capability to...
Rong Liu, Akhil Kumar, Wil M. P. van der Aalst
IJAC
2007
64views more  IJAC 2007»
14 years 10 months ago
Star-Free Geodesic Languages for Groups
In this article we show that every group with a finite presentation satisfying one or both of the small cancellation conditions C (1/6) and C (1/4) − T (4) has the property that...
Susan M. Hermiller, Derek F. Holt, Sarah Rees
SAC
2008
ACM
14 years 10 months ago
PHALANX: a graph-theoretic framework for test case prioritization
Test case prioritization for regression testing can be performed using different metrics (e.g., statement coverage, path coverage) depending on the application context. Employing ...
Murali Krishna Ramanathan, Mehmet Koyutürk, A...