Sciweavers

JSW
2007
147views more  JSW 2007»
13 years 4 months ago
Towards Secure e-Learning Applications: a Multiagent Platform
—This paper presents some results in the intersection of three technological fields: e-learning, multiagent systems, and standards to improve the development of secure systems. T...
Carine G. Webber, Maria de Fátima Webber do...
JSW
2007
126views more  JSW 2007»
13 years 4 months ago
Supporting UML Sequence Diagrams with a Processor Net Approach
— UML sequence diagrams focus on the interaction between different classes. For distributed real time transaction processing it is possible to end up with complex sequence diagra...
Tony Spiteri Staines
JSW
2007
119views more  JSW 2007»
13 years 4 months ago
Formalizing Mobility in Service Oriented Computing
— The usual scenario of service oriented systems is characterized by several services offering the same functionalities, by new services that are continuosly deployed and by othe...
Claudio Guidi, Roberto Lucchi
JSW
2007
97views more  JSW 2007»
13 years 4 months ago
Instantiation of a Classification System Framework that Facilitates Reuse
Abstract—Frameworks are a key technology to reduce software development costs and shorten the time-to-market. However, framework complexity presents reuse problems that limit its...
Sérgio F. Lopes, Adriano Tavares, Joã...
JSW
2007
138views more  JSW 2007»
13 years 4 months ago
Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems
— The anomaly-based intrusion detection systems examine current system activity do find deviations from normal system activity. The present paper proposes a method for normal act...
Veselina G. Jecheva, Evgeniya P. Nikolova
JSW
2007
81views more  JSW 2007»
13 years 4 months ago
User-Controlled Reflection on Join Points
Abstract—All aspect orientation languages provide a onesize-fits-all methodology for reflection on join points. However, the amount of resources necessary for this approach is to...
Piërre van de Laar, Rob Golsteijn
JSW
2007
96views more  JSW 2007»
13 years 4 months ago
IP-based Clustering for Peer-to-Peer Overlays
— The efficiency of overlay networks built on top of the IP network is often threatened by the mismatch between the topologies of the overlay and the underlying IP network, resu...
Piotr Karwaczynski, Jaka Mocnik
JSW
2007
106views more  JSW 2007»
13 years 4 months ago
A Multimodal Biometric System Implemented within an Active Database Management System
— Active databases have been used in many different fields to accomplish many different tasks. One of the main problems today that still have not been solved is authorization. In...
Kornelije Rabuzin, Miroslav Baca, Mirko Malekovic
JSW
2007
94views more  JSW 2007»
13 years 4 months ago
Scoop Methodology: Modeling, Simulation And Analysis For Cooperative Systems
Abstract— In this paper, we present our methodology proposal for cooperative remote systems modeling. Its aim is to develop models of existing or planned cooperative systems. The...
David Saint-Voirin, Christophe Lang, Hervé ...
JSW
2007
173views more  JSW 2007»
13 years 4 months ago
Towards Semantics Driven Generation of Executable Web Services Compositions
— Web services composition is a very active area of research due to the growing interest of public and private organizations in services integration and/or low cost development o...
Giusy Di Lorenzo, Nicola Mazzocca, Francesco Mosca...