Sciweavers

309 search results - page 61 / 62
» WSInterConnect: Dynamic Composition of Web Services Through ...
Sort
View
SBBD
2007
69views Database» more  SBBD 2007»
15 years 3 months ago
Storing AXML documents with ARAXA
Active XML (AXML) documents combine extensional XML data with intentional data defined through Web service calls. The dynamic properties of these documents pose challenges to both ...
Cláudio Ananias Ferraz, Vanessa P. Braganho...
COMAD
2008
15 years 3 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
E4MAS
2006
Springer
15 years 5 months ago
Exploiting the Environment for Coordinating Agent Intentions
One large and quite interesting family of MAS applications is characterized (1) by their large scale in terms of number of agents and physical distribution, (2) by their very dynam...
Tom Holvoet, Paul Valckenaers
111
Voted
ICDCS
2010
IEEE
15 years 2 months ago
Efficient Workstealing for Multicore Event-Driven Systems
Many high-performance communicating systems are designed using the event-driven paradigm. As multicore platforms are now pervasive, it becomes crucial for such systems to take adva...
Fabien Gaud, Sylvain Geneves, Renaud Lachaize, Bap...
ACSAC
2004
IEEE
15 years 5 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...