Sciweavers

3006 search results - page 334 / 602
» Overview
Sort
View
KESAMSTA
2010
Springer
15 years 2 months ago
Trust Estimation Using Contextual Fitness
Trust estimation is an essential process in several multi-agent systems domains. Although it is generally accepted that trust is situational, the majority of the Computational Trus...
Joana Urbano, Ana Paula Rocha, Eugénio C. O...
WISE
2010
Springer
15 years 2 months ago
Providing Scalable Database Services on the Cloud
Abstract. The Cloud is fast gaining popularity as a platform for deploying Software as a Service (SaaS) applications. In principle, the Cloud provides unlimited compute resources, ...
Chun Chen, Gang Chen, Dawei Jiang, Beng Chin Ooi, ...
ASWC
2009
Springer
15 years 2 months ago
LODE: Linking Open Descriptions of Events
People conventionally refer to an action or occurrence taking place at a certain time at a specific location as an event. This notion is potentially useful for connecting individua...
Ryan Shaw, Raphaël Troncy, Lynda Hardman
163
Voted
EKNOW
2009
15 years 2 months ago
Process Diagnostics: A Method Based on Process Mining
As organizations change, their information systems can evolve from simple systems to complex systems, which are hard to understand, and therefore hard to maintain or extend. Proces...
Melike Bozkaya, Joost Gabriels, Jan Martijn E. M. ...
GCA
2009
15 years 2 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson