Sciweavers

2583 search results - page 172 / 517
» Internet Messaging Frameworks
Sort
View
ICWS
2004
IEEE
15 years 5 months ago
Transforming BPEL into Annotated Deterministic Finite State Automata for Service Discovery
Web services advocate loosely coupled systems, although current loosely coupled applications are limited to stateless services. The reason for this limitation is the lack of a met...
Andreas Wombacher, Peter Fankhauser, Erich J. Neuh...
DC
2008
15 years 4 months ago
Contention-free MAC protocols for asynchronous wireless sensor networks
A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of a MAC protocol are: it should be contention-free (avoid collisio...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...
ISCAS
2006
IEEE
155views Hardware» more  ISCAS 2006»
15 years 10 months ago
Design and evaluation of steganography for voice-over-IP
—According to former results from [1] in this paper we summarize the design principles from the general approach and introduce extended experimental test results of a Voice-over-...
Christian Krätzer, Jana Dittmann, Thomas Voge...
WECWIS
2006
IEEE
95views ECommerce» more  WECWIS 2006»
15 years 10 months ago
A Transparent Collaborative Integration Approach for Ad Hoc Product Data
Product data integration is an essential issue for many e-commerce interoperable business systems. Core to this issue is how to maintain semantic consistency between heterogeneous...
Jingzhi Guo
LPAR
2005
Springer
15 years 10 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...