Sciweavers

1700 search results - page 146 / 340
» Introducing Business Process into Legacy Information Systems
Sort
View
SRDS
2010
IEEE
14 years 8 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
EPEW
2005
Springer
15 years 3 months ago
A Compositional Operational Semantics for OWL-S
Software composition via workflow specifications has received a great deal of attention recently. One reason is the high degree of fit with the encapsulation of software modules...
Barry Norton, Simon Foster, Andrew Hughes
ICIP
2006
IEEE
15 years 11 months ago
CBIR in Distributed Databases using a Multi-Agent System
Information retrieval techniques have to face both the growing amount of data to be processed and the "natural" distribution of these data over the network. Hence, we in...
David Picard, Matthieu Cord, Arnaud Revel
PUC
2002
82views more  PUC 2002»
14 years 9 months ago
A Location Model for Communicating and Processing of Context
Location is one of the most important elements of context in ubiquitous computing. In this paper we describe a location model, a spatial-aware communication model and an implement...
Michael Beigl, Tobias Zimmer, Christian Decker
DSN
2006
IEEE
15 years 4 months ago
Automatic Recovery Using Bounded Partially Observable Markov Decision Processes
This paper provides a technique, based on partially observable Markov decision processes (POMDPs), for building automatic recovery controllers to guide distributed system recovery...
Kaustubh R. Joshi, William H. Sanders, Matti A. Hi...