Sciweavers

2477 search results - page 197 / 496
» Object list controlled process data system
Sort
View
HICSS
2009
IEEE
97views Biometrics» more  HICSS 2009»
15 years 10 months ago
Selecting Web Services and Participants for Enforcing Workflow Access Control
Web services have emerged as a de facto standard for encapsulating services within or across organization boundaries. Various proposals have been made to compose Web services into...
San-Yih Hwang, Chuan Yin, Chien-Hsiang Lee
136
Voted
PODS
2008
ACM
165views Database» more  PODS 2008»
16 years 3 months ago
Data exchange and schema mappings in open and closed worlds
In the study of data exchange one usually assumes an openworld semantics, making it possible to extend instances of target schemas. An alternative closed-world semantics only move...
Leonid Libkin, Cristina Sirangelo
IFL
2007
Springer
120views Formal Methods» more  IFL 2007»
15 years 9 months ago
Lazy Contract Checking for Immutable Data Structures
Existing contract checkers for data structures force programmers to choose between poor alternatives. Contracts are either built into the functions that construct the data structur...
Robert Bruce Findler, Shu-yu Guo, Anne Rogers
124
Voted
IPPS
2005
IEEE
15 years 9 months ago
A Powerful Direct Mechanism for Optimal WWW Content Replication
This paper addresses the problem of fine-grained data replication in large distributed systems, such as the Internet, so as to minimize the user access delays. With fine-grained d...
Samee Ullah Khan, Ishfaq Ahmad
BIRTHDAY
2008
Springer
15 years 5 months ago
Secure Data Flow in a Calculus for Context Awareness
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Doina Bucur, Mogens Nielsen