Sciweavers

37 search results - page 7 / 8
» Basic Notions Regarding Business Processes and Supporting In...
Sort
View
CCS
2006
ACM
14 years 5 days ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
HPDC
2005
IEEE
14 years 2 months ago
Recording and using provenance in a protein compressibility experiment
Very large scale computations are now becoming routinely used as a methodology to undertake scientific research. In this context, ‘provenance systems’ are regarded as the equ...
Paul T. Groth, Simon Miles, Weijian Fang, Sylvia C...
BMCBI
2010
195views more  BMCBI 2010»
13 years 3 months ago
MBAT: A scalable informatics system for unifying digital atlasing workflows
Background: Digital atlases provide a common semantic and spatial coordinate system that can be leveraged to compare, contrast, and correlate data from disparate sources. As the q...
Daren Lee, Seth Ruffins, Queenie Ng, Nikhil Sane, ...
WWW
2005
ACM
14 years 9 months ago
Ensuring required failure atomicity of composite Web services
The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...
Sami Bhiri, Olivier Perrin, Claude Godart
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
14 years 3 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang