Sciweavers

1000 search results - page 137 / 200
» Analysis of communication models in web service compositions
Sort
View
ECEASST
2008
106views more  ECEASST 2008»
13 years 7 months ago
Controlling resource access in Directed Bigraphs
: We study directed bigraph with negative ports, a bigraphical framework for representing models for distributed, concurrent and ubiquitous computing. With respect to previous vers...
Davide Grohmann, Marino Miculan
INFOCOM
2002
IEEE
14 years 21 days ago
Optimal MAC State Switching for cdma2000 Networks
— This paper deals with the performance modeling of the various MAC states as defined by the cdma2000 protocol. Our method uses a composite performance metric which has the capa...
Mainak Chatterjee, Sajal K. Das
KBSE
2005
IEEE
14 years 1 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
NCA
2003
IEEE
14 years 1 months ago
Performance Analysis of an Application-level Cooperative Control Protocol
This paper proposes the modeling and the performance analysis of a high-level control protocol – COCOP, which enables cooperative groups of clients to control a shared server de...
Giancarlo Fortino, Carlo Mastroianni, Wilma Russo
ACISP
2009
Springer
14 years 2 months ago
Towards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that ...
Douglas Stebila, Berkant Ustaoglu