Sciweavers

935 search results - page 124 / 187
» The directional p
Sort
View
METRICS
2003
IEEE
14 years 2 months ago
Design Patterns and Change Proneness: An Examination of Five Evolving Systems
Design patterns are recognized, named solutions to common design problems. The use of the most commonly referenced design patterns should promote adaptable and reusable program co...
James M. Bieman, Greg Straw, Huxia Wang, P. Willar...
SAC
2003
ACM
14 years 2 months ago
Organizational Modeling in UML and XML in the Context of Workflow Systems
Workflow technology plays a key role as an enabler in E-Commerce applications, such as supply chains. Until recently the major share of the attention of workflow systems researche...
Wil M. P. van der Aalst, Akhil Kumar, H. M. W. (Er...
WPES
2003
ACM
14 years 2 months ago
Covert channels and anonymizing networks
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...
CRYPTO
2003
Springer
187views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (thi...
Salil P. Vadhan
DFG
2003
Springer
14 years 2 months ago
Inheritance of Business Processes: A Journey Visiting Four Notorious Problems
Abstract. The new millennium is characterized by speed and distribution in every aspect of most business and organization undertaking. Organizations are challenged to bring ideas a...
Wil M. P. van der Aalst