Sciweavers

7066 search results - page 203 / 1414
» Contact Relations with Applications
Sort
View
FC
2005
Springer
119views Cryptology» more  FC 2005»
15 years 10 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva
131
Voted
TEAA
2005
Springer
116views Hardware» more  TEAA 2005»
15 years 10 months ago
MDA and Analysis of Web Applications
Enterprise systems are mission critical. As a result, ensuring their correctness is of primary concern. This paper aids to the analysis of Web Applications, focusing on the aspects...
Behzad Bordbar, Kyriakos Anastasakis
ICDCSW
2003
IEEE
15 years 9 months ago
Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience
Exploiting autonomic adaptation in defending a distributed application is a relatively new research area. We describe how the QuO adaptive middleware was used to implement auto-ad...
Michael Atighetchi, Partha Pratim Pal, Christopher...
GCC
2003
Springer
15 years 9 months ago
A Novel Approach to Semantics-Based Exception Handling for Service Grid Applications
Whenever the characteristics of a service grid environment are addressed, issues related to openness and dynamism pop out first. Such issues do affect the definition and handling o...
Donglai Li, Yanbo Han, Haitao Hu, Jun Fang, Xue Wa...
ICCS
2003
Springer
15 years 9 months ago
DDEMA: A Data Driven Environment for Multiphysics Applications
In this paper we present the design of a multidisciplined problem solving environment (MPSE) for supporting an efficient prediction capability for the response of multiscale interd...
John Michopoulos, Panagiota Tsompanopoulou, Elias ...