-
2
-
-
84869797804
-
-
Technical Report, education.au limited, Available at
-
White G,. The changing landsacpe: E-learning in schools. Technical Report, education.au limited, 2003. Available at: http://admin.edna.edu.au/ dspace/bitstream/2150/54787/1/changing-landscape-gw.pdf.
-
(2003)
The Changing Landsacpe: E-learning in Schools
-
-
White, G.1
-
3
-
-
57349107131
-
Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems
-
ACM: New York, NY, U.S.A.
-
Chen J, Yang Y,. Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems. ICSE '08: Proceedings of the 30th International Conference on Software Engineering. ACM: New York, NY, U.S.A., 2008; 141-150.
-
(2008)
ICSE '08: Proceedings of the 30th International Conference on Software Engineering
, pp. 141-150
-
-
Chen, J.1
Yang, Y.2
-
5
-
-
41549087126
-
E-learn is about business: A business model for the digital economy
-
Lytras M,. E-learn is about business: A business model for the digital economy. Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, Montreal, Canada, 2002; 2658-2659.
-
(2002)
Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, Montreal, Canada
, pp. 2658-2659
-
-
Lytras, M.1
-
6
-
-
2442562667
-
An architecture for supporting vicarious learning in a distributed environment
-
ACM Press: New York, U.S.A.
-
Neely S, Lowe H, Eyers D, Bacon J, Newman J, Gong X,. An architecture for supporting vicarious learning in a distributed environment. SAC '04: Proceedings of the 2004 ACM Symposium on Applied Computing. ACM Press: New York, U.S.A., 2004; 963-970.
-
(2004)
SAC '04: Proceedings of the 2004 ACM Symposium on Applied Computing
, pp. 963-970
-
-
Neely, S.1
Lowe, H.2
Eyers, D.3
Bacon, J.4
Newman, J.5
Gong, X.6
-
7
-
-
84867372404
-
Indirect revenue models for e-learning at universities-The case of learn@wu
-
Mendling J, Neumann G, Pinterits A, Simon B, Wild F,. Indirect revenue models for e-learning at universities-the case of learn@wu. E-Learning Workshop, Hannover, Germany, 2004.
-
(2004)
E-Learning Workshop, Hannover, Germany
-
-
Mendling, J.1
Neumann, G.2
Pinterits, A.3
Simon, B.4
Wild, F.5
-
8
-
-
11444267682
-
Security system for distributed business applications
-
Schmidt K, Wippel T, Furst K,. Security system for distributed business applications. International Journal of Web Services Research 2005; 2 (1): 77-88. (Pubitemid 40080059)
-
(2005)
International Journal of Web Services Research
, vol.2
, Issue.1
, pp. 77-88
-
-
Schmidt, T.1
Wippel, G.2
Glanzer, K.3
Furst, K.4
-
9
-
-
77955304363
-
Temporal dependency based checkpoint selection for dynamic verification of temporal constraints in scientific workflow systems
-
Available at
-
Chen J, Yang Y,. Temporal dependency based checkpoint selection for dynamic verification of temporal constraints in scientific workflow systems. ACM Transactions on Software Engineering and Methodology 2009. Available at: http://www.swinflow.org/papers/TOSEM.pdf.
-
(2009)
ACM Transactions on Software Engineering and Methodology
-
-
Chen, J.1
Yang, Y.2
-
10
-
-
85001818197
-
Privacy and security in e-learning
-
El-Khatib K, Korba L, Xu Y, Yee G,. Privacy and security in e-learning. International Journal of Distance Education Technologies 2003; 1 (4): 11-30.
-
(2003)
International Journal of Distance Education Technologies
, vol.1
, Issue.4
, pp. 11-30
-
-
El-Khatib, K.1
Korba, L.2
Xu, Y.3
Yee, G.4
-
13
-
-
80053487466
-
Trustworthiness fusion of web services based on D-S evidence theory
-
Miami, FL, U.S.A., July
-
Hu R, Liu J, Chen J,. Trustworthiness fusion of web services based on D-S evidence theory. Proceedings of IEEE Eighth International Conference on Web Services (ICWS'10), Miami, FL, U.S.A., July 2010.
-
(2010)
Proceedings of IEEE Eighth International Conference on Web Services (ICWS'10)
-
-
Hu, R.1
Liu, J.2
Chen, J.3
-
14
-
-
80053511852
-
-
Addison Wesley: Reading, MA.
-
Brad C,. Superdistribution. Addison Wesley: Reading, MA, 1996.
-
(1996)
Superdistribution
-
-
Brad, C.1
-
15
-
-
41549113938
-
Copyright? protection?, the mathematics of information coding, extraction, and distribution
-
Cynthia D,. Copyright? protection?, the mathematics of information coding, extraction, and distribution. The IMA Volumes in Mathematics and its Applications 1999; 107: 31-47.
-
(1999)
The IMA Volumes in Mathematics and Its Applications
, vol.107
, pp. 31-47
-
-
Cynthia, D.1
-
17
-
-
20344392161
-
Understanding motivations for internet use in distance education
-
DOI 10.1109/TE.2004.842904
-
Stafford TF,. Understanding motivations for internet use in distance education. IEEE Transactions on Education 2005; 48 (2): 301-306. (Pubitemid 40784515)
-
(2005)
IEEE Transactions on Education
, vol.48
, Issue.2
, pp. 301-306
-
-
Stafford, T.F.1
-
18
-
-
77954897619
-
Handling recoverable temporal violations in scientific workflow systems: A workflow rescheduling based strategy
-
Liu X, Chen J, Wu Z, Ni Z, Yuan D, Yang Y,. Handling recoverable temporal violations in scientific workflow systems: A workflow rescheduling based strategy. Proceedings of 10th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid'10), Melbourne, Australia, May 2010; 534-537.
-
Proceedings of 10th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid'10), Melbourne, Australia, May 2010
, pp. 534-537
-
-
Liu, X.1
Chen, J.2
Wu, Z.3
Ni, Z.4
Yuan, D.5
Yang, Y.6
-
20
-
-
0031162048
-
A Unified Framework for Enforcing Multiple Access Control Policies
-
Jajodia S, Samarati P, Subrahmanian V, Bertino E,. A unified framework for enforcing multiple access control policies. Proceedings of the 1997 ACM SIGMOD International Conference on Management of Data. ACM Press: New York, 1997; 474-485. (Pubitemid 127456808)
-
(1997)
SIGMOD Record (ACM Special Interest Group on Management of Data)
, vol.26
, Issue.2
, pp. 474-485
-
-
Jajodia, S.1
Subrahmanian, V.S.2
Samarati, P.3
Bertino, E.4
-
22
-
-
0347337934
-
Achieving secure and flexible m-services through tickets
-
Wang H, Zhang Y, Cao J, Varadharajan V,. Achieving secure and flexible m-services through tickets. IEEE Transactions on Systems, Man, and Cybernetics, Part A, Special Issue on M-Services 2003; 33: 697-708.
-
(2003)
IEEE Transactions on Systems, Man, and Cybernetics, Part A, Special Issue on M-Services
, vol.33
, pp. 697-708
-
-
Wang, H.1
Zhang, Y.2
Cao, J.3
Varadharajan, V.4
-
23
-
-
0005063385
-
Onion routing for anonymous and private Internet connections
-
Goldschlag D, Reed M, Syverson P,. Onion routing for anonymous and private Internet connections. Communications of the ACM 1999; 24 (2): 39-41.
-
(1999)
Communications of the ACM
, vol.24
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
26
-
-
0348151884
-
A consumer anonymity scalable payment scheme with role based access control
-
Kyoto, Japan
-
Wang H, Cao J, Zhang Y,. A consumer anonymity scalable payment scheme with role based access control. Second International Conference on Web Information Systems Engineering (WISE'01), Kyoto, Japan, 2001; 53-62.
-
(2001)
Second International Conference on Web Information Systems Engineering (WISE'01)
, pp. 53-62
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
-
29
-
-
0141998523
-
Towards securing xml web services
-
Damiani E, Capitani S, Samarati P,. Towards securing xml web services. Proceedings of the 2002 ACM Workshop on XML Security, Washington, DC, U.S.A. 2002; 90-96.
-
(2002)
Proceedings of the 2002 ACM Workshop on XML Security, Washington, DC, U.S.A.
, pp. 90-96
-
-
Damiani, E.1
Capitani, S.2
Samarati, P.3
|