Sciweavers

819 search results - page 107 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
SAC
2005
ACM
15 years 3 months ago
Supporting e-commerce systems formalization with choreography languages
E-commerce as well as B2B applications are essentially based on interactions between different people and organizations (e.g. industry, banks, customers) that usually exploit the ...
Mario Bravetti, Claudio Guidi, Roberto Lucchi, Gia...
NETWORK
2008
139views more  NETWORK 2008»
14 years 9 months ago
Composing semantic services in open sensor-rich environments
Consider a scenario where Jane is at an airport. She wants to find a restaurant with healthy food and short waiting time on the way to her terminal. The airport can provide such s...
Jie Liu, Feng Zhao
IROS
2006
IEEE
112views Robotics» more  IROS 2006»
15 years 3 months ago
Requirements to UPnP for Robot Middleware
– The UPnP (Universal Plug and Play) defines an architecture for pervasive peer-to-peer network connectivity of intelligent appliances. It shares the service oriented architectur...
Sang Chul Ahn, Jung-Woo Lee, Kiwoong Lim, Heedong ...
SIGMETRICS
1997
ACM
103views Hardware» more  SIGMETRICS 1997»
15 years 1 months ago
Performance Issues of Enterprise Level Web Proxies
Enterprise level web proxies relay world-wide web traffic between private networks and the Internet. They improve security, save network bandwidth, and reduce network latency. Wh...
Carlos Maltzahn, Kathy J. Richardson, Dirk Grunwal...
ICCBR
2007
Springer
15 years 3 months ago
A Case-Based Framework for Collaborative Semantic Search in Knowledge Sifter
This paper addresses the role of case-based reasoning in semantic search, and in particular, as it applies to Knowledge Sifter, an agent-based ontology-driven search system based o...
Larry Kerschberg, Hanjo Jeong, Yong Uk Song, Wooju...