Sciweavers

136 search results - page 23 / 28
» A Facilitator to Discover and Compose Services
Sort
View
COMSWARE
2006
IEEE
14 years 1 months ago
Middleware for wireless sensor networks: A survey
Given the fast growing technological progress in microelectronics and wireless communication devices, in the near future, it is foreseeable that Wireless Sensor Networks (WSN) wil...
Salem Hadim, Nader Mohamed
CACM
2008
96views more  CACM 2008»
13 years 7 months ago
The provenance of electronic data
In the study of fine art, provenance refers to the documented history of some art object. Given that documented history, the object attains an authority that allows scholars to ap...
Luc Moreau, Paul T. Groth, Simon Miles, Javier V&a...
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 2 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
WISE
2002
Springer
14 years 18 days ago
UTML: Unified Transaction Modeling Language
Web transactions may be complex, composed of several sub-transactions accessing different resources including legacy systems. They may also have complex semantics. To deal with co...
Nektarios Gioldasis, Stavros Christodoulakis
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
14 years 1 months ago
Improving the Response Time of Business Processes: An Alert-Based Analytical Approach
Large enterprises in application domains such as finance, banking, travel services, and hospital management use business processes for their day-to-day business. An integral part ...
Eleanna Kafeza, Dickson K. W. Chiu, Kamalakar Karl...