Sciweavers

5348 search results - page 966 / 1070
» Time-critical information services
Sort
View
JWSR
2008
145views more  JWSR 2008»
15 years 1 months ago
An Access-Control Framework for WS-BPEL
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Federica Paci, Elisa Bertino, Jason Crampton
EJIS
2007
115views more  EJIS 2007»
15 years 1 months ago
Towards agent-oriented model-driven architecture
Model-Driven Architecture (MDA) supports the transformation from reusable models to executable software. Business representations, however, cannot be fully and explicitly represen...
Liang Xiao 0002, Des Greer
JNW
2006
120views more  JNW 2006»
15 years 1 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
JODS
2006
186views Data Mining» more  JODS 2006»
15 years 1 months ago
Emergent Semantics from Folksonomies: A Quantitative Study
Defining and using ontology to annotate web resources with semantic markups is generally perceived as the primary way to implement the vision of the Semantic Web. The ontology prov...
Lei Zhang 0007, Xian Wu, Yong Yu
ENTCS
2007
131views more  ENTCS 2007»
15 years 1 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo