Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Recently, enterprise interoperability has been improved by the Web Service technology, making available an ever-growing number of services. Service discovery is considered a crucia...
Devis Bianchini, Valeria De Antonellis, Michele Me...
Soft computing (SC) emerged as an integrating framework for a number of techniques that could complement one another quite well (artificial neural networks, fuzzy systems, evolutio...
The proliferation of Geo-Information (GI) production in web-based collaboration environments such as mapping mashups built on top of mapping APIs such as GoogleMaps API poses new c...
: Advanced business processes are mostly distributed and require highly flexible management capabilities. In such scenarios, process parts often leave their initiator’s direct sp...