Sciweavers

458 search results - page 75 / 92
» Designing and executing protocols using the event calculus
Sort
View
GRID
2006
Springer
13 years 7 months ago
Flexible and Secure Logging of Grid Data Access
-- In Grid collaborations, scientists use middleware to execute computational experiments, visualize results, and securely share data on resources ranging from desktop machines to ...
Weide Zhang, David Del Vecchio, Glenn S. Wasson, M...
TCIAIG
2010
13 years 2 months ago
Cinematic Visual Discourse: Representation, Generation, and Evaluation
In this paper, we present the design, implementation, and evaluation of an end-to-end camera planning system called Darshak. Darshak automatically constructs cinematic narrative di...
Arnav Jhala, R. Michael Young
EMSOFT
2007
Springer
14 years 1 months ago
A communication synthesis infrastructure for heterogeneous networked control systems and its application to building automation
In networked control systems the controller of a physicallydistributed plant is implemented as a collection of tightlyinteracting, concurrent processes running on a distributed ex...
Alessandro Pinto, Luca P. Carloni, Alberto L. Sang...
TDSC
2011
13 years 2 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
EDOC
2007
IEEE
14 years 2 months ago
Publishing of Interoperable Services and Processes in UDDI
— This paper presents a requirements analysis and a solution approach to representing workflow processes conforming to the Wf-XML/ASAP standard proposal in a UDDI registry. Wf-X...
Marcus Spies, Harald Schöning, Keith Swenson