Sciweavers

1906 search results - page 160 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
135
Voted
EDOC
2009
IEEE
15 years 10 months ago
An End-to-End Approach for QoS-Aware Service Composition
Abstract—A simple and effective composition of software services into higher-level composite services is still a very challenging task. Especially in enterprise environments, Qua...
Florian Rosenberg, Predrag Celikovic, Anton Michlm...
138
Voted
EDOC
2004
IEEE
15 years 7 months ago
Notations for the Specification and Verification of Composite Web Services
Availability of a wide variety of Web services over the Internet offers opportunities of providing new value added services built by composing them out of existing ones. Service c...
Simon J. Woodman, Doug J. Palmer, Santosh K. Shriv...
124
Voted
CVPR
2004
IEEE
16 years 5 months ago
Bayesian Video Matting Using Learnt Image Priors
Video matting, or layer extraction, is a classic inverse problem in computer vision that involves the extraction of foreground objects, and the alpha mattes that describe their op...
Nicholas Apostoloff, Andrew W. Fitzgibbon
144
Voted
COMPSAC
2008
IEEE
15 years 10 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
97
Voted
HICSS
2003
IEEE
84views Biometrics» more  HICSS 2003»
15 years 9 months ago
Constructing Electronic Marketplaces using Peer-to-Peer Technology
Due to the widespread appearance of filesharing systems like Napster, the peer-to-peer concept has recently become well known. So far, these file-sharing systems have been used fo...
Nick Gehrke, Matthias Schumann