Sciweavers

356 search results - page 43 / 72
» The Dynamic Enterprise Bus
Sort
View
COMCOM
2007
123views more  COMCOM 2007»
13 years 8 months ago
Heuristic and optimal techniques for light-trail assignment in optical ring WDM networks
In this paper we address the problem of constrained optimization (ILP formulation) and propose a set of heuristic algorithms for assigning light-trails [1–4,7,10] to WDM ring ne...
Ashwin Gumaste, Paparao Palacharla
ICEIS
2005
IEEE
14 years 2 months ago
Process Oriented Discovery of Business Partners
: Emerging technologies and industrial standards in the field of Web services enable a much faster and easier cooperation of distributed partners. With the increasing number of en...
Axel Martens
ACSAC
1999
IEEE
14 years 23 days ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
ICCAD
2003
IEEE
152views Hardware» more  ICCAD 2003»
14 years 5 months ago
Leakage Power Optimization Techniques for Ultra Deep Sub-Micron Multi-Level Caches
On-chip L1 and L2 caches represent a sizeable fraction of the total power consumption of microprocessors. In deep sub-micron technology, the subthreshold leakage power is becoming...
Nam Sung Kim, David Blaauw, Trevor N. Mudge
SACMAT
2003
ACM
14 years 1 months ago
Induced role hierarchies with attribute-based RBAC
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles. When the service-providing enterprise has a massive customer base, ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu