Sciweavers

464 search results - page 64 / 93
» Identity Management for Self-Portrayal
Sort
View
CCS
2010
ACM
13 years 6 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
ICEBE
2009
IEEE
118views Business» more  ICEBE 2009»
13 years 6 months ago
Temporal Exception Prediction for Loops in Resource Constrained Concurrent Workflows
Workflow management systems (WfMS) are widely used for improving business processes and providing better quality of services. However, rapid changes in business environment can ca...
Iok-Fai Leong, Yain-Whar Si
ICOODB
2009
163views Database» more  ICOODB 2009»
13 years 6 months ago
Mapping XSD to OO Schemas
This paper presents algorithms that make it possible to process XML data that conforms to XML Schema (XSD) in a mainstream object-oriented programming language. These algorithms a...
Suad Alagic, Philip A. Bernstein
CSCW
2011
ACM
13 years 3 months ago
Creating a context of trust with ICTs: restoring a sense of normalcy in the environment
This paper reports on an ethnographic study of the technology-enabled behavior that took place amongst a citizen population living in a conflict zone. We interviewed 65 Iraqi citi...
Bryan Semaan, Gloria Mark
ISCI
2011
13 years 3 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni