Sciweavers

2880 search results - page 532 / 576
» Types are calling conventions
Sort
View
CAISE
2001
Springer
15 years 8 months ago
Relaxed Soundness of Business Processes
Business processes play a central role in the reorganization of a company and the (re)design of the respective information system(s). Typically the processes are described with the...
Juliane Dehnert, Peter Rittgen
135
Voted
CCS
2001
ACM
15 years 8 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
134
Voted
DEXA
2001
Springer
151views Database» more  DEXA 2001»
15 years 8 months ago
Cache Conscious Clustering C3
The two main techniques of improving I/O performance of Object Oriented Database Management Systems(OODBMS) are clustering and buffer replacement. Clustering is the placement of o...
Zhen He, Alonso Marquez
155
Voted
ICSE
2001
IEEE-ACM
15 years 8 months ago
Encoding Program Executions
Dynamic analysis is based on collecting data as the program runs. However, raw traces tend to be too voluminous and too unstructured to be used directly for visualization and unde...
Steven P. Reiss, Manos Renieris
127
Voted
KI
2001
Springer
15 years 8 months ago
Extracting Situation Facts from Activation Value Histories in Behavior-Based Robots
The paper presents a new technique for extracting symbolic ground facts out of the sensor data stream in autonomous robots for use under hybrid control architectures, which compris...
Frank Schönherr, Mihaela Cistelecan, Joachim ...