Sciweavers

3343 search results - page 505 / 669
» Network Objects
Sort
View
110
Voted
DSOM
2007
Springer
15 years 8 months ago
AURIC: A Scalable and Highly Reusable SLA Compliance Auditing Framework
Abstract. Service Level Agreements (SLA) are needed to allow business interactions to rely on Internet services. Service Level Objectives (SLO) specify the committed performance le...
Hasan, Burkhard Stiller
80
Voted
SEMWEB
2007
Springer
15 years 8 months ago
SALT: Weaving the Claim Web
In this paper we present a solution for “weaving the claim web”, i.e. the creation of knowledge networks via so-called claims stated in scientific publications created with th...
Tudor Groza, Knud Möller, Siegfried Handschuh...
SG
2007
Springer
15 years 8 months ago
Semantic Information and Local Constraints for Parametric Parts in Interactive Virtual Construction
Abstract. This paper introduces a semantic representation for virtual prototyping in interactive virtual construction applications. The representation reflects semantic information...
Peter Biermann, Christian Fröhlich, Marc Eric...
115
Voted
ASWEC
2006
IEEE
15 years 8 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Multimedia Informal Communication by Wearable Computer based on Real-World Context and Graffiti
The informal information can be so intuitive, emotional, personal, honest and subjective that it is very difficult to get them from the formal media. In this paper, we demonstrate...
Shun'ichi Tano, Tatsuhiro Takayama, Mitsuru Iwata,...