IBM

Displaying 2521 - 2530 of 2543 results

  • Cryptography From Noisy Storage

    White Papers · Jun 2008 · Provided By IBM

    The authors show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. They thereby consider individual-storage attacks, i.e. the dishonest party attempts to store each incoming qubit separately. Their model is similar to the model of bounded-quantum storage; however, they consider an...

    Download Now
  • Applying Patterns During Business Process Modeling

    White Papers · Jun 2008 · Provided By IBM

    There is wide agreement that patterns can accelerate the process of designing a solution and reduce modeling time, while at the same time they enable an organization to more easily adopt best practices. Although the business process community has put a major emphasis on patterns, notably the famous workflow patterns,...

    Download Now
  • SBVR Use Cases

    White Papers · Mar 2008 · Provided By IBM

    Semantics of Business Vocabulary and Rules (SBVR) is a new standard from the OMG that combines aspects of ontologies and of rule systems. This paper summarizes SBVR, reviews some possible use cases for SBVR, and discusses ways that vocabularies and rules given in SBVR could relate to established ontology standards,...

    Download Now
  • Repository for Business Processes and Arbitrary Associated Metadata

    White Papers · Jan 2008 · Provided By IBM

    The authors have published a repository for storing business processes and associated metadata. The BPEL Repository is an Eclipse plug-in originally built for BPEL business processes and other related XML data. It provides a framework for storing, finding and using these documents. Other research prototypes can reuse these features and...

    Download Now
  • From Business Process Model to Consistent Implementation: A Case for Formal Verification Methods

    White Papers · Nov 2007 · Provided By IBM

    Today's business applications and their underlying process models are becoming more and more complicated, making the implementation of these processes an increasingly challenging task. On the one hand, tools and methods exist to describe the business processes. On the other hand, different tools and method exist to describe the IT...

    Download Now
  • Generation of Business Process Models for Object Life Cycle Compliance

    White Papers · Aug 2007 · Provided By IBM

    Business process models usually capture data exchanged between tasks in terms of objects. These objects are commonly standardized using reference data models that prescribe, among other things, allowed object states. Allowed state transitions can be modeled as object life cycles that require compliance of business processes. In this paper, the...

    Download Now
  • Amnesic Distributed Storage

    White Papers · Jul 2007 · Provided By IBM

    Distributed storage algorithms implement the abstraction of a shared register over distributed base objects. The authors study a specific class of storage algorithms, which they call amnesic: these have the pragmatic property that old values written in the implemented register might be eventually forgotten, i.e., they are not permanently kept...

    Download Now
  • Formal Properties of Distributed Database Networks

    White Papers · Jul 2007 · Provided By IBM

    A configuration consisting of sensors and communication nodes that support user database functions can be modeled as a network of distributed databases. In this paper, the authors investigate certain properties of such networks, and examine the ways in which two or more database networks can be linked into a single...

    Download Now
  • A Static Compliance-Checking Framework for Business Process Models

    White Papers · May 2007 · Provided By IBM

    Regulatory compliance of business operations is a critical problem for enterprises. As enterprises increasingly use business process management systems to automate their business processes, technologies to automatically check the compliance of process models against compliance rules are becoming important. In this paper, the authors present a method to improve the...

    Download Now
  • Efficient Fork-Linearizable Access to Untrusted Shared Memory

    White Papers · Apr 2007 · Provided By IBM

    When data is stored on a faulty server that is accessed concurrently by multiple clients, the server may present inconsistent data to different clients. For example, the server might complete a write operation of one client, but respond with stale data to another client. The researchers introduced the notion of...

    Download Now