We describe a methodology for assembling composite services based on three basic processes which are independent of the concrete implementation: Abstraction Process, Service Compos...
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
WS-* specifications cover a variety of issues ranging from security and reliability to transaction support in web services. However, these specifications do not address web servic...
We describe a methodology for creating composite web services, a key ingredient in spatial data infrastructure (SDI) applications, which we demonstrate on an emergency management ...