Sciweavers

AICT
2006
IEEE
163views Communications» more  AICT 2006»
13 years 10 months ago
A Methodology for Searching Reusable Business Processes
Web Services are becoming the prominent paradigm for distributed computing and electronic businesses. This makes natural the extension of the concepts at the base of the workflow ...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...
AICT
2006
IEEE
120views Communications» more  AICT 2006»
13 years 10 months ago
Business Processes Characterisation Through Definition of Structural and Non-Structural Criteria
Workflow and Web Services have the main role in the development and in the realisation of B2B architectures. In this context, the principal target is to compose many services supp...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...
AICT
2006
IEEE
115views Communications» more  AICT 2006»
13 years 10 months ago
Implementation of two Resilience Mechanisms using Multi Topology Routing and Stub Routers
— Resilient Routing Layers (RRL) and Multiple Routing Configurations (MRC) have been proposed as methods to achieve fast recovery from router and link failures in connectionless...
Stein Gjessing
AICT
2006
IEEE
122views Communications» more  AICT 2006»
13 years 10 months ago
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems
A peer-to-peer file sharing system includes a lookup and a content distribution protocol. Very efficient peer-to-peer protocols exist for content distribution, but efficient in...
Anh-Tuan Gai, Laurent Viennot
AICT
2006
IEEE
108views Communications» more  AICT 2006»
13 years 10 months ago
Enhancing IEEE 802.11e standard in congested environments
IEEE 802.11e is a wireless local area networking standard introducing quality of service. It defines new MAC protocols, mainly HCF and EDCF. EDCF is a contentionbased channel acce...
Mounir Frikha, Fatma Ben Said, Lilia Maalej, Faiza...
AICT
2006
IEEE
117views Communications» more  AICT 2006»
13 years 10 months ago
Mapping DiffServ to MAC differentiation for IEEE 802.11e
In Internet, the user's traffic crosses several domains. More and more the users want end-to-end quality of service (QoS). So it’s necessary to have differentiation mechani...
Mounir Frikha, Tibi Najet, Faiza Tabbana
AICT
2006
IEEE
210views Communications» more  AICT 2006»
13 years 10 months ago
Model-Based Analysis of Obligations in Web Service Choreography
In this paper we discuss a model-based approach to the analysis of service interactions for coordinated web service compositions using obligation policies specified in the form of...
Howard Foster, Sebastián Uchitel, Jeff Mage...
AICT
2006
IEEE
13 years 10 months ago
Optimal Solution of the Maximum All Request Path Grooming Problem
— We give an optimal solution to the Maximum All Request Path Grooming (MARPG) problem motivated by a traffic grooming application. The MARPG problem consists in finding the ma...
Jean-Claude Bermond, Michel Cosnard, David Coudert...
AICT
2006
IEEE
13 years 10 months ago
SMS: Simplifying Mobile Services - for Users and Service Providers
Giovanni Bartolomeo, Nicola Blefari-Melazzi, Giova...