Sciweavers

97 search results - page 17 / 20
» Cost and Price Calculation for Internet Integrated Services
Sort
View
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
14 years 18 days ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
ICRA
2002
IEEE
84views Robotics» more  ICRA 2002»
14 years 8 days ago
Queueing Network Modeling and Lead Time Compression of Electronic Procurement
Abstract- Procurement, i.e., the process of obtaining materials or services and managing their inflow into organizations, is a critical process in supply chain management. Internet...
C. V. L. Raju, Y. Narahari
WINET
2002
144views more  WINET 2002»
13 years 7 months ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
TES
2001
Springer
13 years 11 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
SEMWEB
2001
Springer
13 years 11 months ago
ITTALKS: A Case Study in the Semantic Web and DAML
Effective use of the vast quantity of information now available on the web will require the use of “Semantic Web” markup languages such as the DARPA Agent Markup Language (DAML...
R. Scott Cost, Timothy W. Finin, Anupam Joshi, Yun...