Sciweavers

740 search results - page 127 / 148
» Coordination Mechanisms
Sort
View
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 9 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
JCIT
2007
159views more  JCIT 2007»
13 years 9 months ago
GDIA: A Scalable Grid Infrastructure for Data Intensive Applications
The applications in many scientific fields, like bioinformatics and high-energy physics etc, increasingly demand the computing infrastructures can provide more computing power and...
Xiaohui Wei, Zhaohui Ding, Wilfred W. Li, Osamu Ta...
ECRA
2007
140views more  ECRA 2007»
13 years 9 months ago
Strategies in supply chain management for the Trading Agent Competition
Negotiating with suppliers and with customers is a key part of supply chain management. However, with recent technological advances, the mechanisms available to carry out such act...
Yain-Whar Si, David Edmond, Marlon Dumas, Chan U. ...
IJCIA
2002
137views more  IJCIA 2002»
13 years 9 months ago
Co-Evolution in Social Interactions
An interesting problem which has been widely investigated is under what circumstances will a society of rational agents realize some particular stable situations, and whether they ...
Hiroshi Sato, Akira Namatame
JIIS
2002
118views more  JIIS 2002»
13 years 9 months ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...