Sciweavers

851 search results - page 138 / 171
» A Governance Model for SOA
Sort
View
ICMCS
2005
IEEE
72views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Revenue Aware Preemption Policy in Multimedia Communication Networks
Preemption of low priority call connections to accommodate high priority call connections is a widely recommended technique in a multimedia communication network. A preemption pol...
Iftekhar Ahmad, Joarder Kamruzzaman, Srinivas Aswa...
WORDS
2005
IEEE
14 years 2 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
MSR
2005
ACM
14 years 2 months ago
Repository mining and Six Sigma for process improvement
In this paper, we propose to apply artifact mining in a global development environment to support measurement based process management and improvement, such as SEI/CMMI’s GQ(I)M...
Michael VanHilst, Pankaj K. Garg, Christopher Lo
EUROCRYPT
2005
Springer
14 years 2 months ago
Related-Key Boomerang and Rectangle Attacks
This paper introduces the related-key boomerang and the related-key rectangle attacks. These new attacks can expand the cryptanalytic toolbox, and can be applied to many block ciph...
Eli Biham, Orr Dunkelman, Nathan Keller
EUROPKI
2005
Springer
14 years 2 months ago
Legal Security for Transformations of Signed Documents: Fundamental Concepts
Abstract. Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In partic...
Andreas U. Schmidt, Zbynek Loebl