Sciweavers

851 search results - page 161 / 171
» A Governance Model for SOA
Sort
View
GRID
2007
Springer
14 years 2 months ago
Resource usage policy expression and enforcement in grid computing
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Jun Feng, Glenn S. Wasson, Marty Humphrey
INFOCOM
2006
IEEE
14 years 2 months ago
Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Rep
— This paper investigates theoretical aspects of the uneven energy depletion phenomenon recently noticed in sink-based wireless sensor networks. We consider uniformly distributed...
Stephan Olariu, Ivan Stojmenovic
ELPUB
2006
ACM
14 years 2 months ago
What are the Prospects for Publishing Online Scholarly Journals in Malaysia? The Cultural Constraint
Most of the studies conducted on future business models for electronic scholarly publishing have concentrated on the major publishing areas of North America and Western Europe, an...
Jamay'ah Zakaria, Fytton Rowland
IWRIDL
2006
ACM
141views Education» more  IWRIDL 2006»
14 years 2 months ago
Shallow syntax analysis in Sanskrit guided by semantic nets constraints
We present the state of the art of a computational platform for the analysis of classical Sanskrit. The platform comprises modules for phonology, morphology, segmentation and shal...
Gérard P. Huet
IWIA
2005
IEEE
14 years 2 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp