Sciweavers

70 search results - page 8 / 14
» (U, N)-Implications and Their Characterizations
Sort
View
WWW
2004
ACM
14 years 8 months ago
A semantic approach for designing business protocols
Business processes involve interactions among autonomous partners. We propose that these interactions be specified modularly as protocols. Protocols can be published, enabling imp...
Ashok U. Mallya, Munindar P. Singh
ECIS
2003
13 years 9 months ago
ICT corporate infrastructures and risk: a dual perspective
Corporate information infrastructures are deployed to reduce risks of data fragmentation and misalignment between the computing resources and the business objectives. However, the...
Claudio U. Ciborra, Daniel Osei-joehene
ITA
2008
107views Communications» more  ITA 2008»
13 years 7 months ago
On Varieties of Literally Idempotent Languages
A language L A is literally idempotent in case that ua2 v L if and only if uav L, for each u, v A , a A. Varieties of literally idempotent languages result naturally by taking...
Ondrej Klíma, Libor Polák
DAM
2007
88views more  DAM 2007»
13 years 7 months ago
Digital planarity - A review
Digital planarity is defined by digitizing Euclidean planes in the three-dimensional digital space of voxels; voxels are given either in the grid point or the grid cube model. Th...
Valentin E. Brimkov, David Coeurjolly, Reinhard Kl...
STOC
2009
ACM
167views Algorithms» more  STOC 2009»
14 years 8 months ago
Universally utility-maximizing privacy mechanisms
A mechanism for releasing information about a statistical database with sensitive data must resolve a trade-off between utility and privacy. Publishing fully accurate information ...
Arpita Ghosh, Tim Roughgarden, Mukund Sundararajan