Sciweavers

697 search results - page 89 / 140
» Composing Services with JOLIE
Sort
View
ECWEB
2010
Springer
195views ECommerce» more  ECWEB 2010»
13 years 6 months ago
Bilateral Negotiation in a Multi-agent Supply Chain System
A supply chain is a set of organizations directly linked by flows of services from suppliers to customers. Supply chain activities range from the ordering and receipt of raw materi...
Fernando Lopes, Helder Coelho
IFIP
2010
Springer
13 years 6 months ago
Labeled VoIP Data-Set for Intrusion Detection Evaluation
Abstract. VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and in...
Mohamed Nassar, Radu State, Olivier Festor
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 3 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
DOCENG
2011
ACM
12 years 8 months ago
A framework with tools for designing web-based geographic applications
Many Web-based geographic applications have been developed in various domains, such as tourism, education, surveillance and military. However, developing such applications is a cu...
The Nhan Luong, Sébastien Laborie, Thierry ...
WWW
2010
ACM
14 years 3 months ago
Autonomous resource provisioning for multi-service web applications
Dynamic resource provisioning aims at maintaining the endto-end response time of a web application within a predefined SLA. Although the topic has been well studied for monolithi...
Dejun Jiang, Guillaume Pierre, Chi-Hung Chi