Sciweavers

7918 search results - page 233 / 1584
» Model Composition Directives
Sort
View
ISCI
2008
86views more  ISCI 2008»
15 years 3 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
INFOCOM
2011
IEEE
14 years 7 months ago
Construction of directional virtual backbones with minimum routing cost in wireless networks
—It is well-known that the application of directional antennas can help conserve bandwidth and energy consumption in wireless networks. Thus, to achieve efficiency in wireless n...
Ling Ding, Weili Wu, James Willson, Hongjie Du, Wo...
SIGIR
2009
ACM
15 years 10 months ago
CompositeMap: a novel framework for music similarity measure
With the continuing advances in data storage and communication technology, there has been an explosive growth of music information from different application domains. As an effe...
Bingjun Zhang, Jialie Shen, Qiaoliang Xiang, Ye Wa...
WECWIS
2003
IEEE
102views ECommerce» more  WECWIS 2003»
15 years 9 months ago
FUSION: A System Allowing Dynamic Web Service Composition and Automatic Execution
Service portals are systems which expose a bundle of web services to the user, allowing the specification and subsequent execution of complex tasks defined over these individual...
Debra E. VanderMeer, Anindya Datta, Kaushik Dutta,...
TES
2001
Springer
15 years 8 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...