Sciweavers

1566 search results - page 271 / 314
» Contification Using Dominators
Sort
View
ESCIENCE
2005
IEEE
15 years 3 months ago
On the Costs for Reliable Messaging in Web/Grid Service Environments
As Web Services have matured they have been substantially leveraged within the academic, research and business communities. An exemplar of this is the realignment, last year, of t...
Shrideep Pallickara, Geoffrey Fox, Beytullah Yildi...
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 3 months ago
Who Joins the Platform? The Case of the RFID Business Ecosystem
Today, many knowledge-based technology applications form a business ecosystem: a set of complex products and services made by multiple firms in which no firm is dominant. For this...
Anne Quaadgras
ICDCSW
2005
IEEE
15 years 3 months ago
Cluster-Based Intelligent Searching in Unstructured Peer-to-Peer Networks
Existing cluster-based searching schemes in unstructured peer-to-peer (P2P) networks employ flooding/random forwarding on connected dominating sets (CDS) of networks. There exist...
Xiuqi Li, Jie Wu
WONS
2005
IEEE
15 years 3 months ago
Broadcasting in Hybrid Ad Hoc Networks
In this paper, we consider hybrid ad hoc networks, which are composed of two kinds of nodes, regular ones and nodes with additional capabilities. For example, multi-hop cellular a...
François Ingelrest, David Simplot-Ryl, Ivan...
ADBIS
2005
Springer
138views Database» more  ADBIS 2005»
15 years 3 months ago
Software Quality and Life Cycles
Abstract. Quality of software has growing role of the modern software engineering work. Typical current trends in the development process are the dominating role of quality systems...
Hannu Jaakkola, Bernhard Thalheim