Selecting quality services over the Internet is tedious because it requires looking up of potential services, and yet the qualities of these services may evolve with time. Existin...
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
This paper discusses new mobile usage scenarios for WLAN technologies and presents an architecture that is based on the notion of intermittent connectivity instead of seamless con...
Abstract—Modern service-oriented systems have increasingly complex loosely-coupled architectures that often exhibit poor performance and resource efficiency and have high operat...
Samuel Kounev, Fabian Brosig, Nikolaus Huber, Ralf...
Abstract: Over the last years a multitude of approaches and frameworks making prescriptions on how to document an enterprise architecture (EA) have been developed. These approaches...
Sabine Buckl, Florian Matthes, Christian M. Schwed...