Sciweavers

233 search results - page 30 / 47
» Composing and combining policies under the policy machine
Sort
View
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
IQIS
2004
ACM
14 years 2 months ago
A Framework for Analysis of Data Freshness
Data freshness has been identified as one of the most important data quality attributes in information systems. This importance increases particularly in the context of distribute...
Mokrane Bouzeghoub, Verónika Peralta
GCC
2004
Springer
14 years 2 months ago
Engineering Process Coordination Based on a Service Event Notification Model
Abstract. Due to the complexity and uncertainties, the engineering process requires dynamic collaborations among the heterogeneous systems and human interactions. In this paper, we...
Jian Cao, Jie Wang, Shen-sheng Zhang, Minglu Li, K...
ICSOC
2004
Springer
14 years 2 months ago
Hybrid web service composition: business processes meet business rules
Over the last few years several process-based web service composition languages have emerged, such as BPEL4WS and BPML. These languages define the composition on the basis of a pr...
Anis Charfi, Mira Mezini
VLDB
1995
ACM
73views Database» more  VLDB 1995»
14 years 4 days ago
Hot Block Clustering for Disk Arrays with Dynamic Striping
RAID5 disk arrays provide high performance and high reliability for reasonable cost. However RAID5 suffers a performance penalty during block updates. In order to overcome this pr...
Kazuhiko Mogi, Masaru Kitsuregawa