Sciweavers

1147 search results - page 161 / 230
» Transformation of Access Rights
Sort
View
CAISE
2007
Springer
14 years 5 months ago
Modeling Ubiquitous Business Process Driven Applications
This paper presents a model driven approach for the generation of business process driven web applications within the context of ubiquitous environments. For this reason, we have t...
Victoria Torres, Pau Giner, Vicente Pelechano
MDM
2007
Springer
136views Communications» more  MDM 2007»
14 years 4 months ago
iPDA: Supporting Privacy-Preserving Location-Based Mobile Services
This demonstration presents iPDA, a system to support privacy-preserving data access in location-based mobile services. The iPDA system consists of three main components: 1) a mob...
Jing Du, Jianliang Xu, Xueyan Tang, Haibo Hu
ITNG
2006
IEEE
14 years 4 months ago
Secure Two-Way Transfer of Measurement Data
We introduce a measurement system architecture, which has three main qualities: secure two-way transfer of measurement data, quick adaptability to different kinds of measurement ...
Marko Hassinen, Maija Marttila-Kontio, Mikko Saesm...
ADAEUROPE
2005
Springer
14 years 4 months ago
Extending Ravenscar with CSP Channels
Abstract. The Ravenscar Profile is a restricted subset of the Ada tasking model, designed to meet the requirements of producing analysable and deterministic code. A central featur...
Diyaa-Addein Atiya, Steve King
LCPC
2005
Springer
14 years 4 months ago
Concurrency Analysis for Parallel Programs with Textually Aligned Barriers
Abstract. A fundamental problem in the analysis of parallel programs is to determine when two statements in a program may run concurrently. This analysis is the parallel analog to ...
Amir Kamil, Katherine A. Yelick