Sciweavers

3318 search results - page 138 / 664
» The Weak Instance Model
Sort
View
COOPIS
2000
IEEE
13 years 11 months ago
Workflow Modeling Using Proclets
The focus of traditional workflow management systems is on control flow within one process definition, that describes how a single case (i.e., workflow instance) is handled in isol...
Wil M. P. van der Aalst, Paulo Barthelmess, Claren...
COMMA
2010
13 years 3 months ago
Probabilistic Semantics for the Carneades Argument Model Using Bayesian Networks
Abstract. This paper presents a technique with which instances of argument structures in the Carneades model can be given a probabilistic semantics by translating them into Bayesia...
Matthias Grabmair, Thomas F. Gordon, Douglas Walto...
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
14 years 2 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...
GCC
2004
Springer
14 years 1 months ago
Reliable Accounting in Grid Economic Transactions
In the Grid computing model a remote service is provided by a resource owner to a client. The resource owner executes a client job and charges the client for a corresponding fee. I...
Luigi Catuogno, Pompeo Faruolo, Umberto Ferraro Pe...
IADIS
2004
13 years 9 months ago
Implementing Cognitive Modellig in CS Education: Aligning Theory and Practice of Learning to Program
It can be argued that although computer science may seem one of the best researched areas, it could also be one of the worst taught. In this research we examine the residual probl...
Des Traynor, J. Gibson