Sciweavers

775 search results - page 122 / 155
» A Service-oriented Approach for the i* Framework
Sort
View
ENTCS
2008
130views more  ENTCS 2008»
13 years 8 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
EOR
2008
90views more  EOR 2008»
13 years 8 months ago
Quality of service statistics over heterogeneous networks: Analysis and applications
Heterogeneous wireless/wired networks and ubiquitous environments are gaining ever more attention by research community. To properly control and manage such puzzles a deep knowled...
Alessio Botta, Antonio Pescapè, Giorgio Ven...
COMGEO
2007
ACM
13 years 8 months ago
A package for exact kinetic data structures and sweepline algorithms
In this paper we present a package for implementing exact kinetic data structures built on objects which move along polynomial trajectories. We discuss how the package design was ...
Daniel Russel, Menelaos I. Karavelas, Leonidas J. ...
JMM2
2006
140views more  JMM2 2006»
13 years 8 months ago
A Cost-Effective Peer-to-Peer Architecture for Large-Scale On-Demand Media Streaming
This paper presents a cost-effective peer-to-peer (P2P) architecture for large-scale on-demand media streaming, named BitVampire. BitVampire's primary design goal is to aggreg...
Xin Liu, Son T. Vuong
ENTCS
2007
93views more  ENTCS 2007»
13 years 8 months ago
Modeling Pointer Redirection as Cyclic Term-graph Rewriting
We tackle the problem of data-structure rewriting including global and local pointer redirections. Each basic rewrite step may perform three kinds of actions: (i) Local redirectio...
Dominique Duval, Rachid Echahed, Fréd&eacut...