Sciweavers

1663 search results - page 181 / 333
» Validation and Verification of Simulation Models
Sort
View
147
Voted
KCAP
2005
ACM
15 years 9 months ago
Towards Browsing Distant Metadata Using Semantic Signatures
In this document, we describe a light-weighted ontology mediation method that allows users to send semantic queries to distant data repositories to browse for learning object meta...
Andrew Choi, Marek Hatala
119
Voted
HICSS
1998
IEEE
158views Biometrics» more  HICSS 1998»
15 years 8 months ago
Accountability Centered Approach to Business Process Reengineering
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements a...
Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
ESOP
2006
Springer
15 years 7 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam
131
Voted
CCS
2000
ACM
15 years 7 months ago
Accountable certificate management using undeniable attestations
This paper initiates a study of accountable certificate management methods, necessary to support long-term authenticity of digital documents. Our main contribution is a model for ...
Ahto Buldas, Peeter Laud, Helger Lipmaa
AMW
2010
15 years 5 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos