Sciweavers

1040 search results - page 54 / 208
» Resource Usage Verification
Sort
View
CSB
2005
IEEE
118views Bioinformatics» more  CSB 2005»
15 years 3 months ago
A Protein Interaction Verification System Based on a Neural Network Algorithm
Large amounts of protein-protein interaction data have been identified using various genome-scale screening techniques. Although interaction data is a valuable resource, high-thro...
Min Su Lee, Seung-Soo Park, Min Kyung Kim
ECOWS
2006
Springer
15 years 1 months ago
Formal Modelling and Verification of an Asynchronous Extension of SOAP
Current web services are largely based on a synchronous request-response model that uses the Simple Object Access Protocol SOAP. Next-generation telecommunication networks, on the...
Maurice H. ter Beek, Stefania Gnesi, Franco Mazzan...
JCP
2008
142views more  JCP 2008»
14 years 9 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami
AISS
2010
165views more  AISS 2010»
14 years 7 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
AMCS
2011
341views Mathematics» more  AMCS 2011»
14 years 4 months ago
FSP and FLTL framework for specification and verification of middle-agents
Agents are a useful abstraction frequently employed as a basic building block in modeling service, information and resource sharing in global environments. The connecting of reques...
Amelia Badica, Costin Badica