Sciweavers

669 search results - page 61 / 134
» Mastering the Master Theorem
Sort
View
ICDCS
2005
IEEE
15 years 3 months ago
Filter Based Directory Replication: Algorithms and Performance
Directories have become an important component of the enterprise security and identity management middleware. This paper describes a novel filter based replication model for Light...
Apurva Kumar
IRI
2005
IEEE
15 years 3 months ago
Change impact analysis of enterprise architectures
An enterprise architecture is a high-level description intended to capture the vision of an enterprise integrating all its dimensions: organization structure, business processes, ...
Frank S. de Boer, Marcello M. Bonsangue, Luuk Groe...
AIED
2005
Springer
15 years 3 months ago
What Do You Mean by to Help Learning of Metacognition?
Several computer-based learning support systems and methods help learners to master metacognitive activity. Which systems and methods are designed to eliminate which difficulties a...
Michiko Kayashima, Akiko Inaba, Riichiro Mizoguchi
ER
2005
Springer
134views Database» more  ER 2005»
15 years 3 months ago
Spatial Relations for Semantic Similarity Measurement
Measuring semantic similarity among concepts is the core method for assessing the degree of semantic interoperability within and between ontologies. In this paper, we propose to ex...
Angela Schwering, Martin Raubal
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 3 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...