Sciweavers

21 search results - page 2 / 5
» ws 2010
Sort
View
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 2 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
JSA
2010
173views more  JSA 2010»
12 years 11 months ago
Hardware/software support for adaptive work-stealing in on-chip multiprocessor
During the past few years, embedded digital systems have been requested to provide a huge amount of processing power and functionality. A very likely foreseeable step to pursue th...
Quentin L. Meunier, Frédéric P&eacut...
PROCEDIA
2010
127views more  PROCEDIA 2010»
12 years 11 months ago
Web service selection for transactional composition
In this work we address the issue of selecting and composing Web Services (WSs) considering functional requirements and transactional properties. We formalize the WS composition p...
Yudith Cardinale, Joyce El Haddad, Maude Manouvrie...
SIAMMAX
2010
111views more  SIAMMAX 2010»
12 years 11 months ago
The Canonical Generalized Polar Decomposition
The polar decomposition of a square matrix has been generalized by several authors to scalar products on Rn or Cn given by a bilinear or sesquilinear form. Previous work has focuse...
Nicholas J. Higham, Christian Mehl, Françoi...
WS
2010
ACM
13 years 3 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel