Sciweavers

1421 search results - page 210 / 285
» The First and Second Max-SAT Evaluations
Sort
View
ESWS
2006
Springer
14 years 2 months ago
WSTO: A Classification-Based Ontology for Managing Trust in Semantic Web Services
The aim of this paper is to provide a general ontology that allows the specification of trust requirements in the Semantic Web Services environment. Both client and Web Service can...
Stefania Galizia
BPM
2008
Springer
217views Business» more  BPM 2008»
14 years 1 months ago
Detecting Regulatory Compliance for Business Process Models through Semantic Annotations
A given business process may face a large number of regulatory obligations the process may or comply with. Providing tools and techniques through which an evaluation of the complia...
Guido Governatori, Jörg Hoffmann, Shazia Wasi...
JVM
2004
165views Education» more  JVM 2004»
14 years 16 days ago
Using Hardware Performance Monitors to Understand the Behavior of Java Applications
Modern Java programs, such as middleware and application servers, include many complex software components. Improving the performance of these Java applications requires a better ...
Peter F. Sweeney, Matthias Hauswirth, Brendon Caho...
ICDCS
2010
IEEE
14 years 7 days ago
Efficient Workstealing for Multicore Event-Driven Systems
Many high-performance communicating systems are designed using the event-driven paradigm. As multicore platforms are now pervasive, it becomes crucial for such systems to take adva...
Fabien Gaud, Sylvain Geneves, Renaud Lachaize, Bap...
SIGCOMM
2010
ACM
13 years 11 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...