Sciweavers

871 search results - page 34 / 175
» A Decentralized Authorization Architecture
Sort
View
OTM
2004
Springer
15 years 3 months ago
A Model-Driven Approach to Designing Cross-Enterprise Business Processes
Abstract. Modeling and managing business processes that span multiple organizations involves new challenges, mainly regarding the ability to cope with change, decentralization, and...
Bernhard Bauer, Jörg P. Müller, Stephan ...
EEE
2005
IEEE
15 years 3 months ago
Service Composition in a Secure Agent-Based Architecture
We describe an agent-based situation-aware survivable architecture for the discovery and composition of web services. Our architecture provides for proofs that guaranteethe consis...
Ramesh Bharadwaj, Supratik Mukhopadhyay, Nilay Pad...
ISW
2009
Springer
15 years 4 months ago
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
Abstract. The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system ...
Mirco Marchetti, Michele Messori, Michele Colajann...
ASPDAC
2005
ACM
109views Hardware» more  ASPDAC 2005»
14 years 11 months ago
Fault tolerant nanoelectronic processor architectures
In this paper we propose a fault-tolerant processor architecture and an associated fault-tolerant computation model capable of fault tolerance in the nanoelectronic environment th...
Wenjing Rao, Alex Orailoglu, Ramesh Karri
ICDE
2006
IEEE
131views Database» more  ICDE 2006»
15 years 3 months ago
A Peer-to-Peer Architecture to Enable Versatile Lookup System Design
The resource lookup requirements in applications such as web caching, web content search, content distribution, resource sharing, network monitoring and management, and e-commerce...
Vivek Sawant, Jasleen Kaur