Sciweavers

1440 search results - page 181 / 288
» Third-Party Flow Control
Sort
View
DBSEC
2006
107views Database» more  DBSEC 2006»
15 years 6 months ago
From Business Process Choreography to Authorization Policies
Abstract. A choreography specifies the interactions between the resources of multiple collaborating parties at design time. The runtime management of authorization policies in orde...
Philip Robinson, Florian Kerschbaum, Andreas Schaa...
EPK
2006
118views Management» more  EPK 2006»
15 years 6 months ago
Transformation of Use Cases to EPC Models
: Within the requirements phase of many projects, functional requirements are often documented as Use Cases. Within SOA projects, however, these Use Cases are not sufficient since ...
Daniel Lübke
148
Voted
NETWORKING
2004
15 years 6 months ago
Improving Distributed Firewalls Performance through Vertical Load Balancing
In this paper we present an extension to an existing hash based packet classification technique in order to improve its performance in a distributed network access control environm...
Olivier Paul
122
Voted
AUTOMATICA
2006
54views more  AUTOMATICA 2006»
15 years 5 months ago
Output tracking of continuous bioreactors through recirculation and by-pass
In this paper, we propose to regulate the output of an auto-catalytic bioprocess (a biological process associated with a growth of a micro-organism) by means of a recirculation lo...
Jérôme Harmand, Alain Rapaport, Fr&ea...
CROSSROADS
2006
139views more  CROSSROADS 2006»
15 years 5 months ago
C-Transformers: a framework to write C program transformations
Program transformation techniques have reached a maturity level that allows processing high-level language sources in new ways. Not only do they revolutionize the implementation o...
Alexandre Borghi, Valentin David, Akim Demaille