Sciweavers

624 search results - page 31 / 125
» Expanding IS Outsourcing Services Through Application Servic...
Sort
View
DBSEC
2007
151views Database» more  DBSEC 2007»
13 years 9 months ago
Location Privacy Protection Through Obfuscation-Based Techniques
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications th...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 8 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
NCA
2005
IEEE
14 years 1 months ago
C-CORE: Using Communication Cores for High Performance Network Services
Recent hardware advances are creating multi-core systems with heterogeneous functionality. This paper explores how applications and middleware can utilize systems comprised of pro...
Sanjay Kumar, Ada Gavrilovska, Karsten Schwan, Sri...
HICSS
2006
IEEE
144views Biometrics» more  HICSS 2006»
14 years 1 months ago
The Choreography Model for IRS-III
This paper describes how we manage the interaction between different heterogeneous web services through choreographies within IRS-III. IRS-III is a framework and platform for deve...
John Domingue, Stefania Galizia, Liliana Cabral
EDOC
2005
IEEE
14 years 1 months ago
FTWeb: A Fault Tolerant Infrastructure for Web Services
The web services architecture came as answers to the search for interoperability among applications. In recent years there has been a growing interest in deploying on the Internet...
Giuliana Teixeira Santos, Lau Cheuk Lung, Carlos M...