Sciweavers

1831 search results - page 253 / 367
» Time Constraints in Workflow Systems
Sort
View
SRDS
1993
IEEE
15 years 8 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
CBSE
2005
Springer
15 years 5 months ago
Qinna, a Component-Based QoS Architecture
— Component-based software engineering (CBSE) is quickly becoming a mainstream approach to software development. At the same time, there is a massive shift from desktop applicati...
Jean-Charles Tournier, Jean-Philippe Babau, Vincen...
BPSC
2009
152views Business» more  BPSC 2009»
15 years 5 months ago
A Formal Temporal Semantics for Microsoft Project based on Allen's Interval Algebra
Process modelling systems are complex and difficult to compare. A key attribute of any process modelling formalism or tool is time which involves how it handles and represents tem...
Denis Gagné, André Trudel
CG
2008
Springer
15 years 3 months ago
Scalable rendering of massive triangle meshes on light field displays
We report on a multiresolution rendering system driving light field displays based on a specially arranged array of projectors and a holographic screen. The system gives multiple ...
Fabio Bettio, Enrico Gobbetti, Fabio Marton, Giova...
118
Voted
ER
2010
Springer
144views Database» more  ER 2010»
15 years 2 months ago
Building Dynamic Models of Service Compositions with Simulation of Provision Resources
Efficient and competitive provision of service compositions depends both on the composition structure, and on planning and management of computational resources necessary for prov...
Dragan Ivanovic, Martin Treiber, Manuel Carro, Sch...