Sciweavers

680 search results - page 80 / 136
» Locating Hidden Servers
Sort
View
QSIC
2007
IEEE
15 years 4 months ago
A Pattern-Based Constraint Description Approach for Web Services
Current WSDL-based description specifies only the operation signatures and locations of Web services. It is widely recognized that a richer description is needed. WS-Security, WS-...
Qianxiang Wang, Min Li, Na Meng, Yonggang Liu, Hon...
APNOMS
2007
Springer
15 years 4 months ago
A Self-managing SIP-Based IP Telephony System Based on a P2P Approach Using Kademlia
Most of Voice over IP(VoIP) systems are deployed using SIP protocol and based in a client-server architecture. A lot of people and companies could be benefited if the system did n...
Felipe de Castro Louback Rocha, Linnyer Beatrys Ru...
COREGRID
2007
Springer
15 years 4 months ago
Optimal Closest Policy with Qos and Bandwidth Constraints
This paper deals with the replica placement problem on fully homogeneous tree networksknownasthe Replica Placementoptimizationproblem. Theclient requests are known beforehand, whil...
Veronika Rehn-Sonigo
ISCA
2005
IEEE
87views Hardware» more  ISCA 2005»
15 years 3 months ago
A Robust Main-Memory Compression Scheme
Lossless data compression techniques can potentially free up more than 50% of the memory resources. However, previously proposed schemes suffer from high access costs. The propose...
Magnus Ekman, Per Stenström
ICWE
2005
Springer
15 years 3 months ago
Separation of Navigation Routing Code in J2EE Web Applications
The navigation routing code of a web application is the part of the code involved in routing a request from a web page through the appropriate components on the server, typically e...
Minmin Han, Christine Hofmeister