Sciweavers

2299 search results - page 320 / 460
» Logical Data Expiration
Sort
View
BPM
2006
Springer
149views Business» more  BPM 2006»
15 years 6 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
DEXA
2008
Springer
85views Database» more  DEXA 2008»
15 years 6 months ago
Reordering of Location Identifiers for Indexing an RFID Tag Object Database
The query performance for tracing tags depends upon the distribution of tag trajectories in the data space. We examine a more efficient representation of tag trajectories by means ...
Sungwoo Ahn, Bonghee Hong
ALT
2010
Springer
15 years 6 months ago
Towards General Algorithms for Grammatical Inference
Many algorithms for grammatical inference can be viewed as instances of a more general algorithm which maintains a set of primitive elements, which distributionally define sets of ...
Alexander Clark
AAAI
2010
15 years 6 months ago
Soundness Preserving Approximation for TBox Reasoning
Large scale ontology applications require efficient and robust description logic (DL) reasoning services. Expressive DLs usually have very high worst case complexity while tractab...
Yuan Ren, Jeff Z. Pan, Yuting Zhao
ICISC
2008
165views Cryptology» more  ICISC 2008»
15 years 5 months ago
Distributed Attribute-Based Encryption
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy, specified as a logical combination of attributes. Such ciphertexts can be decry...
Sascha Müller 0003, Stefan Katzenbeisser, Cla...