Sciweavers

1040 search results - page 54 / 208
» Resource Usage Verification
Sort
View
CSB
2005
IEEE
118views Bioinformatics» more  CSB 2005»
15 years 5 months ago
A Protein Interaction Verification System Based on a Neural Network Algorithm
Large amounts of protein-protein interaction data have been identified using various genome-scale screening techniques. Although interaction data is a valuable resource, high-thro...
Min Su Lee, Seung-Soo Park, Min Kyung Kim
ECOWS
2006
Springer
15 years 3 months ago
Formal Modelling and Verification of an Asynchronous Extension of SOAP
Current web services are largely based on a synchronous request-response model that uses the Simple Object Access Protocol SOAP. Next-generation telecommunication networks, on the...
Maurice H. ter Beek, Stefania Gnesi, Franco Mazzan...
JCP
2008
142views more  JCP 2008»
14 years 11 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami
AISS
2010
165views more  AISS 2010»
14 years 9 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
AMCS
2011
341views Mathematics» more  AMCS 2011»
14 years 6 months ago
FSP and FLTL framework for specification and verification of middle-agents
Agents are a useful abstraction frequently employed as a basic building block in modeling service, information and resource sharing in global environments. The connecting of reques...
Amelia Badica, Costin Badica