Sciweavers

9325 search results - page 1504 / 1865
» The decentralized implementability problem
Sort
View
DSS
2007
124views more  DSS 2007»
15 years 5 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong
JEC
2006
113views more  JEC 2006»
15 years 5 months ago
CyNC: A method for real time analysis of systems with cyclic data flows
The paper addresses a novel method for realtime analysis of systems with cyclic data flows. The presented method is based on Network Calculus principles, where upper and lower flo...
Henrik Schiøler, Jens Dalsgaard Nielsen, Ki...
ECCC
2007
144views more  ECCC 2007»
15 years 5 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
140
Voted
JHSN
2006
85views more  JHSN 2006»
15 years 5 months ago
A scalable intra-domain resource management architecture for DiffServ networks
With the rapid growth of the Internet into a global communication and commercial infrastructure, the need for Quality of Services (QoS) in the Internet becomes more and more import...
Haci A. Mantar, Ibrahim T. Okumus, Junseok Hwang, ...
EJIS
2007
94views more  EJIS 2007»
15 years 5 months ago
Applying ontology-based rules to conceptual modeling: a reflection on modeling decision making
Conceptual modeling represents a domain independently of implementation considerations for purposes of understanding the problem at hand and communicating about it. However, diffe...
Pnina Soffer, Irit Hadar
« Prev « First page 1504 / 1865 Last » Next »