Sciweavers

249 search results - page 41 / 50
» Modelling Security Goals in Business Processes
Sort
View
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
IEEESCC
2005
IEEE
14 years 1 months ago
Online and Minimum-Cost Ad Hoc Delegation in e-Service Composition
The paradigm of automated e-service composition through the integration of existing services promises a fast and efficient development of new services in cooperative business env...
Cagdas Evren Gerede, Oscar H. Ibarra, Bala Ravikum...
AGENTS
1997
Springer
13 years 11 months ago
Adaptable Local Level Arbitration of Behaviors
During the last few years, and in an attempt to provide an ecient alternative to classical methods to designing robot control structures, the behavior-based approach has emerged....
Mohamed Salah Hamdi, Karl Kaiser
ER
2006
Springer
96views Database» more  ER 2006»
13 years 11 months ago
Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling
: Data Provenance refers to the lineage of data including its origin, key events that occur over the course of its lifecycle, and other details associated with data creation, proce...
Sudha Ram, Jun Liu
DGO
2009
175views Education» more  DGO 2009»
13 years 8 months ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...