Sciweavers

3086 search results - page 611 / 618
» Developing Secure Web Applications
Sort
View
FM
2006
Springer
172views Formal Methods» more  FM 2006»
13 years 11 months ago
The Embedded Systems Design Challenge
We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap ...
Thomas A. Henzinger, Joseph Sifakis
IM
2007
13 years 9 months ago
Business-Driven Optimization of Policy-Based Management solutions
— We consider whether the off-line compilation of a set of Service Level Agreements (SLAs) into low-level management policies can lead to the runtime maximization of the overall ...
Issam Aib, Raouf Boutaba
SIMUTOOLS
2008
13 years 9 months ago
A grid-enabled toolkit for in silico oncology simulations
In silico (on the computer) oncology is a multi-disciplinary field that focuses on the examination and modeling of biological mechanisms related to the phenomenon of cancer. In si...
Theodoros E. Athanaileas, Georgios S. Stamatakos, ...
PUK
2001
13 years 9 months ago
Web-based Commerce of Complex Products and Services with Multiple Suppliers
The sales of customisable products and services over the internet is a challenging task within the area of electronic commerce. In this chapter we will present a case study which s...
Liliana Ardissono, Alexander Felfernig, Gerhard Fr...
ISDO
2000
181views Business» more  ISDO 2000»
13 years 9 months ago
eFlow: an Open, Flexible and Configurable Approach to Service Composition
The Web is rapidly becoming the platform through which many companies deliver services to businesses and individual customers. E-Services are typically delivered point-to-point; h...
Fabio Casati