Sciweavers

2742 search results - page 438 / 549
» Business Service Scheduling
Sort
View
IEEEARES
2009
IEEE
14 years 5 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
OTM
2009
Springer
14 years 4 months ago
Revisiting the Behavior of Fault and Compensation Handlers in WS-BPEL
When automating work, it is often desirable to compensate completed work by undoing the work done by one or more activities. In the context of workflow, where compensation actions...
Rania Khalaf, Dieter Roller, Frank Leymann
ICCCN
2008
IEEE
14 years 4 months ago
Can Bilateral ISP Peering Lead to Network-Wide Cooperative Settlement
— The Internet includes thousands of Internet service providers (ISPs) which are interconnected to provide connectivity and service for end-users. Traditionally, the settlement b...
Yang Cheung, Dah-Ming Chiu, Jianwei Huang
NOMS
2008
IEEE
107views Communications» more  NOMS 2008»
14 years 4 months ago
A Framework for the establishment of inter-domain, on-demand VPNs
– Virtual Private Networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction ...
Alexandre Matos, Fernando Matos, Paulo Simõ...
QUATIC
2007
IEEE
14 years 4 months ago
MPS Model-Based Software Acquisition Process Improvement in Brazil
This paper describes an initiative to improve software acquisition process in Brazil. This initiative was conducted in the context of the MPS.BR Program, a nationwide effort to de...
Kival Chaves Weber, Eratostenes Edson Ramalho de A...