Sciweavers

611 search results - page 100 / 123
» Security Issues in Service Composition
Sort
View
CORR
2011
Springer
198views Education» more  CORR 2011»
14 years 6 months ago
Quire: Lightweight Provenance for Smart Phone Operating Systems
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...
LISA
2003
15 years 1 months ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
ICUIMC
2009
ACM
15 years 6 months ago
PicAChoo: a tool for customizable feature extraction utilizing characteristics of textual data
Although documents have hundreds of thousands of unique words, only a small number of words are significantly useful for intelligent services. For this reason, feature extraction ...
Jaeseok Myung, Jung-Yeon Yang, Sang-goo Lee
DAIS
2003
15 years 1 months ago
Jironde: A Flexible Framework for Making Components Transactional
Abstract. It is generally agreed that one of the key services of componentbased systems are transactions. However, an agreement on how components should be involved in transactions...
Marek Prochazka
TWEB
2010
164views more  TWEB 2010»
14 years 10 months ago
A distributed service-oriented architecture for business process execution
The Business Process Execution Language (BPEL) standardizes the development of composite enterprise applications that make use of software components exposed as Web services. BPEL...
Guoli Li, Vinod Muthusamy, Hans-Arno Jacobsen