Sciweavers

52 search results - page 10 / 11
» A Rigorous Methodology for Composing Services
Sort
View
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 7 days ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
BMCBI
2010
142views more  BMCBI 2010»
13 years 5 months ago
pplacer: linear time maximum-likelihood and Bayesian phylogenetic placement of sequences onto a fixed reference tree
Background: Likelihood-based phylogenetic inference is generally considered to be the most reliable classification method for unknown sequences. However, traditional likelihood-ba...
Frederick A. Matsen III, Robin B. Kodner, E. Virgi...
AO
2006
127views more  AO 2006»
13 years 5 months ago
Formal ontology meets industry
in ontology is quite abstract and often based on toy-examples to the point that the gap between the work of theoreticians and the needs of real applications is too wide to be cross...
Stefano Borgo, Matteo Cristani, Roberta Cuel
IEEEARES
2007
IEEE
13 years 11 months ago
Static evaluation of Certificate Policies for GRID PKIs interoperability
Validating an end-entity X.509 digital certificate prior to authorizing it for using a resource into the computational Grid has become a widely studied topic due to its importance...
Valentina Casola, Nicola Mazzocca, Jesus Luna, Osc...
IUI
2004
ACM
13 years 10 months ago
An intelligent assistant for interactive workflow composition
Complex applications in many areas, including scientific computations and business-related web services, are created from collections of components to form workflows. In many case...
Jihie Kim, Marc Spraragen, Yolanda Gil