Sciweavers

3103 search results - page 230 / 621
» Managing Concern Interfaces
Sort
View
ESM
2000
13 years 11 months ago
The simulation of business rules in active databases using expert system approach
A very active field of research of Database Management Systems (DBMS) is concerned with an augmentation of DBMS by rules. Passive rules (constraints) were the first to be investig...
Ivan Bruha, Frantisek Franek, Vladimir L. Rosicky
ADT
2006
13 years 10 months ago
Data Confidentiality: to which extent cryptography and secured hardware can help
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
CN
2006
82views more  CN 2006»
13 years 10 months ago
Fluid-flow analysis of TCP Westwood with RED
This paper concerns TCP Westwood, a recently developed modification of TCP, in combination with RED queue management. We develop a fluid-flow model of the protocol, and use it to s...
Jiwei Chen, Fernando Paganini, M. Y. Sanadidi, Ren...
JNW
2007
102views more  JNW 2007»
13 years 10 months ago
Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments
Abstract— A location tracking sensor network is being deployed in several buildings at the University of Michigan to help explore issues in design of pervasive environments. Mana...
Lukasz Opyrchal, Atul Prakash, Amit Agrawal
CSCW
2000
ACM
13 years 10 months ago
A Knowledge-based Approach to Handling Exceptions in Workflow Systems
This paper describes a novel knowledge-based approach for helping workflow process designers and participants better manage the exceptions (deviations from an ideal collaborative ...
Mark Klein, Chrysanthos Dellarocas