Sciweavers

1818 search results - page 177 / 364
» How users use access control
Sort
View
121
Voted
ACMSE
2004
ACM
15 years 8 months ago
Role of the resource broker in the Grid
Today, as Grid Computing is becoming a reality, there is a need for managing and monitoring the available resources worldwide, as well as the need for conveying these resources to...
Enis Afgan
144
Voted
VISSYM
2004
15 years 4 months ago
Interactive Treemaps With Detail on Demand to Support Information Search in Documents
This paper addresses the issue of how information visualization techniques can be used to assist full-text search in electronic documents. Our approach supports multiple term quer...
Stefan Schlechtweg, Petra Schulze-Wollgast, Heidru...
159
Voted
HPDC
2003
IEEE
15 years 8 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
134
Voted
BPM
2006
Springer
149views Business» more  BPM 2006»
15 years 4 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
ECIS
2004
15 years 4 months ago
Using IT to Make Place in Space: Evaluating Mobile Technology Support for Sport Spectators
This paper reports results from two field trials of TrottingPal, a mobile system that supports event information management and seamless collaboration between spectators at the tr...
Andreas Nilsson