Sciweavers

8810 search results - page 1624 / 1762
» Openness
Sort
View
CSREASAM
2006
15 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
DAGSTUHL
2006
15 years 5 months ago
AMFIBIA: A Meta-Model for the Integration of Business Process Modelling Aspects
Abstract. AMFIBIA is a meta-model that formalizes the essential aspects and concepts of business process modelling. Though AMFIBIA is not the first approach to formalizing the aspe...
Ekkart Kindler, Björn Axenath, Vladimir Rubin
DAGSTUHL
2006
15 years 5 months ago
Taming Dynamic and Selfish Peers
This paper addresses two important challenges for current P2P systems, namely churn and selfishness. First, we report on a system [19] whose desirable properties (small peer degre...
Stefan Schmid, Fabian Kuhn, Thomas Moscibroda, Rog...
DAIS
2006
15 years 5 months ago
A Code Migration Framework for AJAX Applications
AJAX (Asynchronous JavaScript and XML) defines a new paradigm for writing highly interactive web applications. Prominent web sites such as Google Maps have made AJAX popular. Writi...
Arno Puder
DGO
2006
128views Education» more  DGO 2006»
15 years 5 months ago
Supporting humanitarian relief logistics operations through online geocollaborative knowledge management
Over the past two years, horrific disasters such as the Asian Tsunami, Hurricane Katrina, and the Pakistan Earthquake have demonstrated the critical need for effective technologic...
Brian M. Tomaszewski, Alan M. MacEachren, Scott Pe...
« Prev « First page 1624 / 1762 Last » Next »