Sciweavers

3504 search results - page 578 / 701
» Secure protocol composition
Sort
View
ESWS
2005
Springer
15 years 7 months ago
Optimally Distributing Interactions Between Composed Semantic Web Services
When information services are organized to provide some composed functionality, their interactions can be formally represented as workflows. Traditionally, workflows are executed...
Ion Constantinescu, Walter Binder, Boi Faltings
ESWS
2004
Springer
15 years 7 months ago
Approaches to Semantic Web Services: an Overview and Comparisons
The next Web generation promises to deliver Semantic Web Services (SWS); services that are self-described and amenable to automated discovery, composition and invocation. A prerequ...
Liliana Cabral, John Domingue, Enrico Motta, Terry...
ICNP
2003
IEEE
15 years 6 months ago
On the Cost-Quality Tradeoff in Topology-Aware Overlay Path Probing
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as ¢¤£¦¥¨§© , which is prohibitive i...
Chiping Tang, Philip K. McKinley
WECWIS
2003
IEEE
82views ECommerce» more  WECWIS 2003»
15 years 6 months ago
Property Propagation Rules for Prioritizing and Synchronizing Trading Activities
With the growing number of marketplaces and trading partners in the e–commerce environment, software tools designed to act on behalf of human traders are increasingly used to au...
Yain-Whar Si, David Edmond, Arthur H. M. ter Hofst...
INFOCOM
2002
IEEE
15 years 6 months ago
Optimal MAC State Switching for cdma2000 Networks
— This paper deals with the performance modeling of the various MAC states as defined by the cdma2000 protocol. Our method uses a composite performance metric which has the capa...
Mainak Chatterjee, Sajal K. Das