Sciweavers

3259 search results - page 421 / 652
» Modeling Autonomous-System Relationships
Sort
View
CSFW
2010
IEEE
15 years 8 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...
ICPR
2010
IEEE
15 years 7 months ago
Topic-Sensitive Tag Ranking
Social tagging is an increasingly popular way to describe and classify documents on the web. However, the quality of the tags varies considerably since the tags are authored freel...
Yan'An Jin, Ruixuan Li, Zhengding Lu, Kunmei Wen, ...
AAAI
2007
15 years 7 months ago
Representing and Reasoning about Commitments in Business Processes
A variety of business relationships in open settings can be understood in terms of the creation and manipulation of commitments among the participants. These include B2C and B2B c...
Nirmit Desai, Amit K. Chopra, Munindar P. Singh
CISC
2008
Springer
118views Cryptology» more  CISC 2008»
15 years 7 months ago
Inter-domain Identity-Based Proxy Re-encryption
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
Qiang Tang, Pieter H. Hartel, Willem Jonker
BPM
2006
Springer
126views Business» more  BPM 2006»
15 years 7 months ago
Verification of Business Process Integration Options
Abstract. We propose a meta-meta framework architecture for supporting the behaviour based integration of two business processes. The meta-meta level provides basic integration ope...
Georg Grossmann, Michael Schrefl, Markus Stumptner