Sciweavers

5972 search results - page 1158 / 1195
» Extending Design Environments to Software Architecture Desig...
Sort
View
SAC
2010
ACM
15 years 8 months ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
MOBIQUITOUS
2008
IEEE
15 years 7 months ago
Context-aware fault tolerance in migratory services
Mobile ad hoc networks can be leveraged to provide ubiquitous services capable of acquiring, processing, and sharing real-time information from the physical world. Unlike Internet...
Oriana Riva, Josiane Nzouonta, Cristian Borcea
CIT
2004
Springer
15 years 6 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
DEXA
2004
Springer
110views Database» more  DEXA 2004»
15 years 6 months ago
An a Priori Approach for Automatic Integration of Heterogeneous and Autonomous Databases
Data integration is the process that gives users access to multiple data sources though queries against a global schema. Semantic heterogeneity has been identified as the most imp...
Ladjel Bellatreche, Guy Pierra, Dung Nguyen Xuan, ...
ICSOC
2004
Springer
15 years 6 months ago
Associating assertions with business processes and monitoring their execution
Business processes that span organizational borders describe the interaction between multiple parties working towards a common objective. They also express business rules that gov...
Alexander Lazovik, Marco Aiello, Mike P. Papazoglo...
« Prev « First page 1158 / 1195 Last » Next »