Sciweavers

6844 search results - page 1160 / 1369
» Web Service Security
Sort
View
EDOC
2003
IEEE
15 years 9 months ago
A Model-Driven Transformation Method
Model-driven architectures (MDA) separate the business or application logic from the underlying platform technology and represent this logic with precise semantic models. These mo...
Jana Koehler, Rainer Hauser, Shubir Kapoor, Freder...
146
Voted
NCA
2003
IEEE
15 years 9 months ago
Performance Analysis of an Application-level Cooperative Control Protocol
This paper proposes the modeling and the performance analysis of a high-level control protocol – COCOP, which enables cooperative groups of clients to control a shared server de...
Giancarlo Fortino, Carlo Mastroianni, Wilma Russo
103
Voted
JCDL
2003
ACM
94views Education» more  JCDL 2003»
15 years 9 months ago
Content Access Characterization in Digital Libraries
To support non-trivial clients, such as data exploration and analysis environments, digital libraries must be able to describe the access modes that their contents support. We pre...
Greg Janee, James Frew, David Valentine
NETGAMES
2003
ACM
15 years 9 months ago
On the geographic distribution of on-line game servers and players
With a shift in the on-line gaming landscape from individually hosted game servers, to gaming services centrally hosted by game publishers, game console manufacturers, and third-p...
Wu-chang Feng, Wu-chi Feng
AP2PC
2003
Springer
15 years 9 months ago
Agent-Based Social Assessment of Shared Resources
Prior to the access to decentralized resources like web services and shared files in peer-to-peer networks, the user needs to be provided with accurate information about these res...
Matthias Nickles, Gerhard Weiß
« Prev « First page 1160 / 1369 Last » Next »