Sciweavers

1707 search results - page 213 / 342
» An Adaptive Service Selection Approach to Service Compositio...
Sort
View
CSREASAM
2010
13 years 6 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
PERCOM
2004
ACM
14 years 7 months ago
Agile Middleware of Pervasive Computing Environments
In this paper, we survey the models and approaches applied to the middleware services of pervasive computing environments. Architectural styles and patterns introduced in the doma...
Eila Niemelä, Teemu Vaskivuo
PPPJ
2004
ACM
14 years 1 months ago
MailConfigurator: automatic configuration of e-mail accounts through Java mobile agents
: E-Mail is the most exploited service in the Internet. We present an application based on Java mobile agents to automatically perform required steps to register an account. The us...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
WSE
2002
IEEE
14 years 1 months ago
Understanding Web Usage for Dynamic Web-Site Adaptation: A Case Study
Every day, new information, products and services are being offered by providers on the World Wide Web. At the same time, the number of consumers and the diversity of their intere...
Nan Niu, Eleni Stroulia, Mohammad El-Ramly
JBCS
2002
102views more  JBCS 2002»
13 years 8 months ago
Configurable Data Integration Middleware System
This paper presents a new approach for generating configured and flexible middleware systems for integration of heterogeneous and distributed data. The configuration is based on t...
Álvaro Cesar P. Barbosa, Fabio Porto, Ruben...