Sciweavers

295 search results - page 35 / 59
» On Representing Instance Changes in Adaptive Process Managem...
Sort
View
CCS
2007
ACM
14 years 2 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
MMM
2010
Springer
141views Multimedia» more  MMM 2010»
13 years 10 months ago
Slow Intelligence Systems
: Networks and distributed computing systems are becoming increasingly important and at the same time, more and more critical to the world of Information Technology. This rash spre...
Shi-Kuo Chang
ADBIS
2006
Springer
118views Database» more  ADBIS 2006»
14 years 2 months ago
Computational Database Technology Applied to Option Pricing Via Finite Differences
Computational database technology spans the two research fields data-base technology and scientific computing. It involves development of database capabilities that support compu...
Jöns Åkerlund, Krister Åhlander, ...
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
14 years 3 months ago
Developing Reliable Measures of Privacy Management within Social Networking Sites
Social networking sites and other examples of online social spaces have greatly expanded their members’ opportunities for self expression and social interaction, while creating ...
Catherine Dwyer, Starr Roxanne Hiltz, Marshall Sco...
JUCS
2010
134views more  JUCS 2010»
13 years 7 months ago
Leveraging ICT Deployment and Integration in a Public Organization Aged 176 Years A Greek Case Study
: The successful deployment and exploitation of an Information and Communications Technologies (ICT) project in a traditional Public Organization involves the proper design and imp...
Melpomeni Hatzikou, Iraklis-Panagiotis Agiovlasiti...