Sciweavers

195 search results - page 27 / 39
» Testing Complex Business Process Solutions
Sort
View
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 11 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
SIGUCCS
2000
ACM
14 years 2 months ago
Ills Cured with a Dose of Remedy
We presented a paper in Denver that addressed our Remedy design process. At that time we talked about our current development process, but we hadn't implemented the product a...
Michael Critchfield, Michael Murray
ICDT
2010
ACM
211views Database» more  ICDT 2010»
14 years 7 months ago
Probabilistic Data Exchange
The work reported here lays the foundations of data exchange in the presence of probabilistic data. This requires rethinking the very basic concepts of traditional data exchange, ...
Ronald Fagin, Benny Kimelfeld, Phokion Kolaitis
ICIP
2002
IEEE
14 years 11 months ago
A kernel machine based approach for multi-view face recognition
Techniques that can introduce low-dimensional feature representation with enhanced discriminatory power is of paramount importance in face recognition applications. It is well kno...
Juwei Lu, Kostas N. Plataniotis, Anastasios N. Ven...
FDL
2008
IEEE
14 years 4 months ago
Contradiction Analysis for Constraint-based Random Simulation
Constraint-based random simulation is state-of-the-art in verification of multi-million gate industrial designs. This method is based on stimulus generation by constraint solving...
Daniel Große, Robert Wille, Robert Siegmund,...