Sciweavers

186 search results - page 19 / 38
» Choreographies: using Constraints to Satisfy Service Request...
Sort
View
FC
1998
Springer
96views Cryptology» more  FC 1998»
13 years 11 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
WWW
2010
ACM
14 years 2 months ago
Selecting skyline services for QoS-based web service composition
Web service composition enables seamless and dynamic integration of business applications on the web. The performance of the composed application is determined by the performance ...
Mohammad Alrifai, Dimitrios Skoutas, Thomas Risse
SIGCOMM
2005
ACM
14 years 1 months ago
Meridian: a lightweight network location service without virtual coordinates
This paper introduces a lightweight, scalable and accurate framework, called Meridian, for performing node selection based on network location. The framework consists of an overla...
Bernard Wong, Aleksandrs Slivkins, Emin Gün S...
GRID
2006
Springer
13 years 7 months ago
Simultaneous Scheduling of Replication and Computation for Data-Intensive Applications on the Grid
One of the first motivations of using grids comes from applications managing large data sets in field such as high energy physics or life sciences. To improve the global throughput...
Frederic Desprez, Antoine Vernois
NOSSDAV
1993
Springer
13 years 11 months ago
Probabilistic Assignment of Movies to Storage Devices in a Video-On-Demand System
–A video-on-demand server must satisfy a large customer base and a diverse archive of movies under changing movie popularity and daily load peaks. These requirements must be sati...
Thomas D. C. Little, Dinesh Venkatesh