Sciweavers

12562 search results - page 2230 / 2513
» Distributed Xbean Applications
Sort
View
114
Voted
ECOWS
2006
Springer
15 years 7 months ago
Verifying Correctness of Web Services Choreography
This paper is about Web services used in distributed, inter-organizational business cooperation (choreography). In this application scenario, we have a multipart functional conven...
Tarek Melliti, Céline Boutrous-Saab, Sylvai...
108
Voted
ESTIMEDIA
2006
Springer
15 years 7 months ago
A Mixed-level Co-simulation Method for System-level Design Space Exploration
The Sesame modeling and simulation framework aims at efficient system-level design space exploration of embedded multimedia systems. A primary objective of Sesame is the ion at mu...
Mark Thompson, Andy D. Pimentel, Simon Polstra, Ca...
106
Voted
EUC
2006
Springer
15 years 7 months ago
Prediction Efficiency in Predictive p-CSMA/CD
Predictive p-persistent CSMA protocol is an important MAC solution developed for networked sensor/control applications and used in Local Operating Networks (LonWorks) technology. T...
Marek Miskowicz
127
Voted
EWCBR
2006
Springer
15 years 7 months ago
Case-Based Support for Collaborative Business
This paper describes the development of the generic collaboration support architecture CAKE incorporating case-based reasoning (CBR). CAKE provides unified access to knowledge avai...
Ralph Bergmann, Andrea Freßmann, Kerstin Max...
148
Voted
FSE
2006
Springer
174views Cryptology» more  FSE 2006»
15 years 7 months ago
Distinguishing Attacks on the Stream Cipher Py
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other ...
Souradyuti Paul, Bart Preneel, Gautham Sekar
« Prev « First page 2230 / 2513 Last » Next »