Sciweavers

35419 search results - page 223 / 7084
» How are we doing
Sort
View
149
Voted
IEEESCC
2006
IEEE
15 years 10 months ago
Control the Flow: How to Safely Compose Streaming Services into Business Processes
Although workflow languages are widely used for composing discrete services, these are not suitable for stream based interactions. In this paper we address the problem of how to ...
Biörn Biörnstad, Cesare Pautasso, Gustav...
HICSS
2005
IEEE
182views Biometrics» more  HICSS 2005»
15 years 10 months ago
How the Semantic Web is Being Used: An Analysis of FOAF Documents
— Semantic Web researchers have initially focused on the representation, development and use of ontologies but paid less attention to the social and structural relationships invo...
Li Ding, Lina Zhou, Timothy W. Finin, Anupam Joshi
ECAL
2001
Springer
15 years 9 months ago
I Like What I Know: How Recognition-Based Decisions Can Structure the Environment
Cognitive mechanisms are shaped by evolution to match their environments. But through their use, these mechanisms exert a shaping force on their surroundings as well. Here we explo...
Peter M. Todd, Simon Kirby
134
Voted
EUROCRYPT
2001
Springer
15 years 9 months ago
How to Convert the Flavor of a Quantum Bit Commitment
In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealin...
Claude Crépeau, Frédéric L&ea...
179
Voted
WOSP
2000
ACM
15 years 9 months ago
How system architectures impede interoperability
Interoperability problems arise when complex software systems are constructed by integrating distinct, and often heterogeneous, components. By performing interoperability analysis...
Leigh A. Davis, Jamie Payton, Rose F. Gamble