Sciweavers

312 search results - page 46 / 63
» Technology for boundaries
Sort
View
SISW
2005
IEEE
15 years 3 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...
APGV
2005
ACM
15 years 3 months ago
Towards a psychophysical evaluation of a surgical simulator for bone-burring
The CRS4 experimental bone-burr simulator implements visual and haptic effects through the incorporation of a physics-based contact model and patient-specific data. Psychophysica...
Gavin Brelstaff, Marco Agus, Andrea Giachetti, Enr...
BPM
2005
Springer
97views Business» more  BPM 2005»
15 years 3 months ago
Service Interaction Patterns
Abstract. With increased sophistication and standardization of modeling languages and execution platforms supporting business process management (BPM) across traditional boundaries...
Alistair P. Barros, Marlon Dumas, Arthur H. M. ter...
CIKM
2005
Springer
15 years 3 months ago
Rotation invariant indexing of shapes and line drawings
We present data representations, distance measures and organizational structures for fast and efficient retrieval of similar shapes in image databases. Using the Hough Transform w...
Michail Vlachos, Zografoula Vagena, Philip S. Yu, ...
ITRUST
2005
Springer
15 years 3 months ago
Interactive Credential Negotiation for Stateful Business Processes
Business Processes for Web Services are the new paradigm for lightweight enterprise integration. They cross organizational boundaries, are provided by entities that see each other ...
Hristo Koshutanski, Fabio Massacci