Sciweavers

6844 search results - page 1165 / 1369
» Web Service Security
Sort
View
EDM
2010
128views Data Mining» more  EDM 2010»
15 years 5 months ago
Using Educational Data Mining Methods to Study the Impact of Virtual Classroom in E-Learning
In the past few years, Iranian universities have embarked to use e-learning tools and technologies to extend and improve their educational services. After a few years of conducting...
Mohammad Hassan Falakmasir, Jafar Habibi
COMAD
2008
15 years 5 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
FORTE
2007
15 years 5 months ago
Exploring the Connection of Choreography and Orchestration with Exception Handling and Finalization/Compensation
Web service choreography describes protocols for multiparty collaboration, whereas orchestration focuses on single peers. One key requirement of choreography is to support transact...
Hongli Yang, Xiangpeng Zhao, Chao Cai, Zongyan Qiu
IADIS
2008
15 years 5 months ago
Recent Adaptive E-Learning Contributions Towards A "Standard Ready" Architecture
Adaptation and personalization services of the information offered to the users in open e-learning environments are considered to be the turning point of recent research efforts. ...
Sotirios Botsios, Dimitrios Georgiou
ICWS
2008
IEEE
15 years 5 months ago
A Formal Model of Human Workflow
BPEL (Business Process Execution Language) has become the standard for specifying and executing workflow specifications for web service composition invocation. A major weakness of ...
Xiangpeng Zhao, Zongyan Qiu, Chao Cai, Hongli Yang
« Prev « First page 1165 / 1369 Last » Next »