Sciweavers

6844 search results - page 1292 / 1369
» Web Service Security
Sort
View
158
Voted
SOCA
2010
IEEE
15 years 1 months ago
Exploiting multicores to optimize business process execution
While modern CPUs offer an increasing number of cores with shared caches, prevailing execution engines for business processes, workflows, or Web service compositions have not been ...
Achille Peternier, Daniele Bonetta, Cesare Pautass...
SOCIALCOM
2010
15 years 1 months ago
Learning to Predict Ad Clicks Based on Boosted Collaborative Filtering
This paper addresses the topic of social advertising, which refers to the allocation of ads based on individual user social information and behaviors. As social network services (e...
Teng-Kai Fan, Chia-Hui Chang
128
Voted
HPDC
2009
IEEE
15 years 1 months ago
Evaluating the utility of content delivery networks
Content Delivery Networks (CDNs) balance costs and quality in services related to content delivery. This has urged many Web entrepreneurs to make contracts with CDNs. In the liter...
Konstantinos Stamos, George Pallis, Athena Vakali,...
155
Voted
ICWS
2009
IEEE
15 years 1 months ago
A Flexible Approach for Automatic Process Decentralization Using Dependency Tables
Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation points...
Walid Fdhila, Ustun Yildiz, Claude Godart
149
Voted
CCR
2011
14 years 10 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
« Prev « First page 1292 / 1369 Last » Next »