Sciweavers

5766 search results - page 1005 / 1154
» Reverse Engineering of Data
Sort
View
IHIS
2005
ACM
15 years 10 months ago
Verifying web services composition based on hierarchical colored petri nets
Current Web services composition proposals, such as BPML, BPEL, WSCI, and OWL-S, provide notations for describing the control and data flows in Web service collaborations. However...
Yanping Yang, QingPing Tan, Yong Xiao
MM
2005
ACM
179views Multimedia» more  MM 2005»
15 years 10 months ago
rStream: resilient peer-to-peer streaming with rateless codes
The inherent instability and unreliability of peer-to-peer networks introduce several fundamental engineering challenges to multimedia streaming over peer-to-peer networks. First,...
Chuan Wu, Baochun Li
PLDI
2005
ACM
15 years 10 months ago
Essential language support for generic programming
Concepts are an essential language feature for generic programming in the large. Concepts allow for succinct expression of constraints on type parameters of generic algorithms, en...
Jeremy G. Siek, Andrew Lumsdaine
SACMAT
2005
ACM
15 years 10 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
SC
2005
ACM
15 years 10 months ago
Separating Abstractions from Resources in a Tactical Storage System
ng Abstractions from Resources in a Tactical Storage System Douglas Thain† , Sander Klous∗ , Justin Wozniak† , Paul Brenner† , Aaron Striegel† , Jesus Izaguirre† † - ...
Douglas Thain, Sander Klous, Justin M. Wozniak, Pa...
« Prev « First page 1005 / 1154 Last » Next »