Sciweavers

JSW
2006
71views more  JSW 2006»
13 years 4 months ago
Semantics and Extensions of WS-Agreement
When having repeated interactions with a service provider, a service consumer might desire guarantees on the delivery of the service. These guarantees involve both functional and n...
Ganna Frankova, Daniela Malfatti, Marco Aiello
JSAC
2006
107views more  JSAC 2006»
13 years 4 months ago
Efficiency and Braess' Paradox under pricing in general networks
We study the flow control and routing decisions of self-interested users in a general congested network where a single profit-maximizing service provider sets prices for different ...
Xin Huang, Asuman E. Ozdaglar, Daron Acemoglu
ISF
2008
92views more  ISF 2008»
13 years 4 months ago
Information technology workforce skills: The software and IT services provider perspective
It is now commonplace for an organization to turn to external firms for the provision of IT services and software. As technology advances and the business environment continues to ...
Tim Goles, Stephen Hawk, Kate M. Kaiser
CCR
2006
76views more  CCR 2006»
13 years 4 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
PUK
2001
13 years 5 months ago
Scheduling in a Virtual Enterprise in the Service Sector
The work described in this paper presents an approach on scheduling in a virtual enterprise in the tourism sector. This scheduling scenario has to reconcile customers' and ser...
Florian Kandler
ECIS
2003
13 years 5 months ago
Using online services in untrusted environments: a privacy-preserving architecture
While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...
Claus Boyens, Oliver Günther
ICWN
2004
13 years 5 months ago
Suitability of Existing Service Discovery Protocols for Mobile Users in an Ambient Intelligence Environment
Abstract-- Service discovery enables users to access information, resources and services anytime, anywhere. This involves a client, a service provider and an infrastructure for ser...
Davy Preuveneers, Yolande Berbers
SEC
2007
13 years 5 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
PST
2008
13 years 6 months ago
AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System
To enable a rich attribute-based authorization system, it is desirable that a large number of user attributes are available, possibly provided by multiple entities. The user may b...
Apurva Mohan, Douglas M. Blough
IM
2007
13 years 6 months ago
Business-Driven Optimization of Policy-Based Management solutions
— We consider whether the off-line compilation of a set of Service Level Agreements (SLAs) into low-level management policies can lead to the runtime maximization of the overall ...
Issam Aib, Raouf Boutaba