Sciweavers

653 search results - page 63 / 131
» Addressing interoperability issues in access control models
Sort
View
CORR
2008
Springer
89views Education» more  CORR 2008»
13 years 8 months ago
Idiotypic Immune Networks in Mobile Robot Control
Jerne's idiotypic-network theory postulates that the immune response involves interantibody stimulation and suppression, as well as matching to antigens. The theory has proved...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
WWW
2007
ACM
14 years 8 months ago
Crawling multiple UDDI business registries
As Web services proliferate, size and magnitude of UDDI Business Registries (UBRs) are likely to increase. The ability to discover Web services of interest then across multiple UB...
Eyhab Al-Masri, Qusay H. Mahmoud
EMISA
2009
Springer
14 years 2 months ago
Controlled Flexibility and Lifecycle Management of Business Processes through Extensibility
Companies employ business process management suites to model, run, and maintain their processes. These processes are required to comply with requirements originating from standards...
Sören Balko, Arthur H. M. ter Hofstede, Alist...
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
14 years 2 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
INFOCOM
2008
IEEE
14 years 2 months ago
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach
—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
Edson H. Watanabe, Daniel S. Menasché, Edmu...