Sciweavers

624 search results - page 42 / 125
» Expanding IS Outsourcing Services Through Application Servic...
Sort
View
SWS
2004
ACM
14 years 1 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
ICIW
2009
IEEE
14 years 2 months ago
A Model-Driven Approach for Monitoring Business Performance in Web Service Compositions
— Supporting business services through Web service compositions (WSC) as part of service-oriented architectures (SOA) involves business performance monitoring requirements. Their...
Christof Momm, Michael Gebhart, Sebastian Abeck
ECCC
2010
98views more  ECCC 2010»
13 years 6 months ago
Verifying Computations with Streaming Interactive Proofs
Applications based on outsourcing computation require guarantees to the data owner that the desired computation has been performed correctly by the service provider. Methods based...
Graham Cormode, Justin Thaler, Ke Yi
ENTCS
2002
115views more  ENTCS 2002»
13 years 7 months ago
Component-Based Applications: A Dynamic Reconfiguration Approach with Fault Tolerance Support
This paper presents a mechanism for dynamic reconfiguration of component-based applications and its fault tolerance strategy. The mechanism, named generic connector, allows compos...
Thaís Vasconcelos Batista, Milano Gadelha C...
MSWIM
2003
ACM
14 years 29 days ago
Randomized location service in mobile ad hoc networks
Mobile Ad-Hoc Networks (MANETS) are networks of mobile nodes that do not have a fixed infrastructure. Recent research in this field addresses ways of solving existing problems i...
Sangeeta Bhattacharya