Sciweavers

1630 search results - page 195 / 326
» Secure Overlay Network Design
Sort
View
120
Voted
ESCIENCE
2007
IEEE
15 years 9 months ago
A SLA-Oriented Management of Containers for Hosting Stateful Web Services
Service-Oriented Architectures provide integration of interoperability for independent and loosely coupled services. Web services and the associated new standards such as WSRF are...
Christoph Reich, Kris Bubendorfer, Matthias Banhol...
IROS
2007
IEEE
97views Robotics» more  IROS 2007»
15 years 9 months ago
Meld: A declarative approach to programming ensembles
Abstract— This paper presents Meld, a programming language for modular robots, i.e., for independently executing robots where inter-robot communication is limited to immediate ne...
Michael P. Ashley-Rollman, Seth Copen Goldstein, P...
WETICE
2007
IEEE
15 years 9 months ago
A Dominating Set Based Peer-to-Peer Protocol for Real-Time Multi-source Collaboration
Designing a collaborative architecture for real-time applications is an intricate challenge that usually involves dealing with the real-time constraints, resource limitations and ...
Dewan Tanvir Ahmed, Shervin Shirmohammadi, Abdulmo...
ICAC
2006
IEEE
15 years 9 months ago
Hardness of Approximation and Greedy Algorithms for the Adaptation Problem in Virtual Environments
— Over the past decade, wide-area distributed computing has emerged as a powerful computing paradigm. Virtual machines greatly simplify wide-area distributed computing ing the ab...
Ananth I. Sundararaj, Manan Sanghi, John R. Lange,...
ADBIS
2004
Springer
147views Database» more  ADBIS 2004»
15 years 8 months ago
A Hybrid Keyword Search across Peer-to-Peer Federated Databases
The need for Keyword search in databases is suggested both by Web integration with legacy database management system and by dynamic Web publication. However, it sacrifices the inh...
Jungkee Kim, Geoffrey Fox