Sciweavers

4218 search results - page 596 / 844
» Complete sets of cooperations
Sort
View
ATAL
2007
Springer
14 years 5 months ago
Distributed task allocation in social networks
This paper proposes a new variant of the task allocation problem, where the agents are connected in a social network and tasks arrive at the agents distributed over the network. W...
Mathijs de Weerdt, Yingqian Zhang, Tomas Klos
BPM
2007
Springer
125views Business» more  BPM 2007»
14 years 5 months ago
Semantic Analysis of Flow Patterns in Business Process Modeling
Control flow elements are important in process models. Such elements usually appear in graphic models as splits and joins of activity sequences. Workflow patterns reflect possible ...
Pnina Soffer, Yair Wand, Maya Kaner
CCS
2007
ACM
14 years 5 months ago
Direct static enforcement of high-level security policies
A high-level security policy states an overall safety requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires ...
Qihua Wang, Ninghui Li
COCO
2007
Springer
75views Algorithms» more  COCO 2007»
14 years 5 months ago
On the Theory of Matchgate Computations
Valiant has proposed a new theory of algorithmic computation based on perfect matchings and Pfaffians. We study the properties of matchgates—the basic building blocks in this n...
Jin-yi Cai, Vinay Choudhary, Pinyan Lu
COCOON
2007
Springer
14 years 5 months ago
Online Interval Scheduling: Randomized and Multiprocessor Cases
We consider the problem of scheduling a set of equal-length intervals arriving online, where each interval is associated with a weight and the objective is to maximize the total we...
Stanley P. Y. Fung, Chung Keung Poon, Feifeng Zhen...