Sciweavers

118 search results - page 15 / 24
» Surrogate users: a pragmatic approach to defining user needs
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
12 years 11 months ago
Negative Database for Data Security
Data Security is a major issue in any web-based application. There have been approaches to handle intruders in any system, however, these approaches are not fully trustable; evide...
Anup Patel, Niveeta Sharma, Magdalini Eirinaki
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 7 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
HPDC
2002
IEEE
14 years 15 days ago
QoS-Based Resource Discovery in Intermittently Available Environments
In this paper, we address the problem of resource discovery in a grid based multimedia environment, where the resources providers, i.e. servers, are intermittently available. Give...
Yun Huang, Nalini Venkatasubramanian
ER
1999
Springer
152views Database» more  ER 1999»
13 years 11 months ago
Semantically Accessing Documents Using Conceptual Model Descriptions
. When publishing documents on the web, the user needs to describe and classify her documents for the benefit of later retrieval and use. This paper presents an approach to semanti...
Terje Brasethvik, Jon Atle Gulla
BPM
2006
Springer
139views Business» more  BPM 2006»
13 years 11 months ago
Towards a Task-Oriented, Policy-Driven Business Requirements Specification for Web Services
Dynamic assembly of complex software is possible through automated composition of web services. Coordination scripts identify and orchestrate a number of services to fulfil a user ...
Stephen Gorton, Stephan Reiff-Marganiec