Sciweavers

10038 search results - page 1777 / 2008
» Model Checking for Managers
Sort
View
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 11 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
AICT
2006
IEEE
163views Communications» more  AICT 2006»
15 years 11 months ago
A Methodology for Searching Reusable Business Processes
Web Services are becoming the prominent paradigm for distributed computing and electronic businesses. This makes natural the extension of the concepts at the base of the workflow ...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...
AICT
2006
IEEE
109views Communications» more  AICT 2006»
15 years 11 months ago
Experiences in Deploying Services within the Axis Container
The Web Services framework, since it leverages the Service Oriented Architecture model, enables the development of applications that are loosely coupled and easier to manage. A We...
Beytullah Yildiz, Shrideep Pallickara, Geoffrey Fo...
141
Voted
CCGRID
2006
IEEE
15 years 11 months ago
Exploit Failure Prediction for Adaptive Fault-Tolerance in Cluster Computing
As the scale of cluster computing grows, it is becoming hard for long-running applications to complete without facing failures on large-scale clusters. To address this issue, chec...
Yawei Li, Zhiling Lan
CCGRID
2006
IEEE
15 years 11 months ago
SSB : A Grid-based Infrastructure for HLA Systems
Service Oriented EXtensible Modeling and Simulation Supporting Environment Architecture (SO-XMSSEA) is presented based on XMSF thinking and the new technology development of web s...
Xu Li-juan, Peng Xiao-yuan
« Prev « First page 1777 / 2008 Last » Next »