Sciweavers

1357 search results - page 235 / 272
» Controlling Access to Documents: A Formal Access Control Mod...
Sort
View
ICSOC
2009
Springer
13 years 6 months ago
Integrating Complex Events for Collaborating and Dynamically Changing Business Processes
Business processes must become agile, respond to changes in the business environment in a timely manner and quickly adapt themselves to new conditions. Event-Driven Business Proces...
Rainer von Ammon, Thomas Ertlmaier, Opher Etzion, ...
TCOM
2010
162views more  TCOM 2010»
13 years 3 months ago
RFID Reader Receivers for Physical Layer Collision Recovery
Abstract--Arbitration and scheduling of multiple tags in stateof-the-art Radio Frequency Identification (RFID) systems is accomplished on the medium access control layer. Currently...
Christoph Angerer, Robert Langwieser, Markus Rupp
CIDR
2011
274views Algorithms» more  CIDR 2011»
13 years 8 days ago
Cloud Resource Orchestration: A Data-Centric Approach
Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infras...
Yun Mao, Changbin Liu, Jacobus E. van der Merwe, M...
FOIS
2006
13 years 10 months ago
Against Idiosyncrasy in Ontology Development
The world of ontology development is full of mysteries. Recently, ISO Standard 15926 ("Lifecycle Integration of Process Plant Data Including Oil and Gas Production Facilities&...
Barry Smith
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 3 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...