Sciweavers

509 search results - page 49 / 102
» Data Mining Models as Services on the Internet
Sort
View
WWW
2005
ACM
14 years 8 months ago
Web services security configuration in a service-oriented architecture
Security is one of the major concerns when developing missioncritical business applications, and this concern motivated the Web Services Security specifications. However, the exis...
Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamu...
WWW
2009
ACM
14 years 13 days ago
Extracting data records from the web using tag path clustering
Fully automatic methods that extract lists of objects from the Web have been studied extensively. Record extraction, the first step of this object extraction process, identifies...
Gengxin Miao, Jun'ichi Tatemura, Wang-Pin Hsiung, ...
ARTQOS
2003
Springer
14 years 1 months ago
Calculating End-to-End Queuing Delay for Real-Time Services on an IP Network
A crucial factor for real-time (interactive) services is the end-to-end delay experienced by the application. The contribution resulting from the queuing delay induced by the netwo...
Robert E. Kooij, Olav N. Østerbø, J....
SERVICES
2010
201views more  SERVICES 2010»
13 years 2 months ago
IT Auditing to Assure a Secure Cloud Computing
In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through IT auditing. Our approach is to establish a general ...
Zhixiong Chen, John Yoon
ICNP
1998
IEEE
14 years 23 hour ago
Darwin: Customizable Resource Management for Value-Added Network Services
The Internet is rapidly changing from a set of wires and switches that carry packets into a sophisticated infrastructure that delivers a set of complex value-added services to end...
Prashant R. Chandra, Allan Fisher, Corey Kosak, T....