Sciweavers

11182 search results - page 2039 / 2237
» Shape Analysis of Sets
Sort
View
138
Voted
CAISE
2006
Springer
15 years 7 months ago
Compliant and Flexible Business Processes with Business Rules
When modeling business processes, we often implicity think of internal business policies and external regulations. Yet to date, little attention is paid to avoid hard-coding polici...
Stijn Goedertier, Jan Vanthienen
137
Voted
CCS
2006
ACM
15 years 7 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
CLEF
2006
Springer
15 years 7 months ago
Overview of WebCLEF 2006
We report on the CLEF 2006 WebCLEF track devoted to crosslingual web retrieval. We provide details about the retrieval tasks, the used topic set, and the results of WebCLEF partic...
Krisztian Balog, Leif Azzopardi, Jaap Kamps, Maart...
CPM
2006
Springer
125views Combinatorics» more  CPM 2006»
15 years 7 months ago
Geometric Suffix Tree: A New Index Structure for Protein 3-D Structures
Abstract. Protein structure analysis is one of the most important research issues in the post-genomic era, and faster and more accurate query data structures for such 3-D structure...
Tetsuo Shibuya
DCOSS
2006
Springer
15 years 7 months ago
Efficient In-Network Processing Through Local Ad-Hoc Information Coalescence
We consider in-network processing via local message passing. The considered setting involves a set of sensors each of which can communicate with a subset of other sensors. There is...
Onur Savas, Murat Alanyali, Venkatesh Saligrama
« Prev « First page 2039 / 2237 Last » Next »