Sciweavers

1818 search results - page 177 / 364
» How users use access control
Sort
View
ACMSE
2004
ACM
14 years 3 months ago
Role of the resource broker in the Grid
Today, as Grid Computing is becoming a reality, there is a need for managing and monitoring the available resources worldwide, as well as the need for conveying these resources to...
Enis Afgan
VISSYM
2004
13 years 11 months ago
Interactive Treemaps With Detail on Demand to Support Information Search in Documents
This paper addresses the issue of how information visualization techniques can be used to assist full-text search in electronic documents. Our approach supports multiple term quer...
Stefan Schlechtweg, Petra Schulze-Wollgast, Heidru...
HPDC
2003
IEEE
14 years 3 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
BPM
2006
Springer
149views Business» more  BPM 2006»
13 years 11 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
ECIS
2004
13 years 11 months ago
Using IT to Make Place in Space: Evaluating Mobile Technology Support for Sport Spectators
This paper reports results from two field trials of TrottingPal, a mobile system that supports event information management and seamless collaboration between spectators at the tr...
Andreas Nilsson