Sciweavers

1440 search results - page 250 / 288
» Third-Party Flow Control
Sort
View
APN
2004
Springer
14 years 2 months ago
Web Supported Enactment of Petri-Net Based Workflows with XRL/Flower
This paper describes concepts and features of a Web-based system called XRL/flower for carrying out Petri-net based workflows described with XRL (eXchangeable Routing Language). XR...
Alexander Norta
CGO
2004
IEEE
14 years 2 months ago
Optimizing Translation Out of SSA Using Renaming Constraints
Static Single Assignment form is an intermediate representation that uses instructions to merge values at each confluent point of the control flow graph. instructions are not ma...
Fabrice Rastello, François de Ferriè...
CSFW
2004
IEEE
14 years 2 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
BPM
2006
Springer
133views Business» more  BPM 2006»
14 years 2 months ago
Experiences in Enhancing Existing BPM Tools with BPEL Import and Export
The Business Process Execution Language for Web Services (BPEL) has become a de-facto standard for executable process specifications. The broad industry acceptance of BPEL forces w...
Jan Mendling, Kristian Bisgaard Lassen, Uwe Zdun
ESORICS
2006
Springer
14 years 2 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter