Sciweavers

571 search results - page 57 / 115
» From Control Flow to Dataflow
Sort
View
ICWS
2010
IEEE
13 years 6 months ago
An Approach for Mining Web Service Composition Patterns from Execution Logs
A service-oriented application is composed of multiple web services to fulfill complex functionality that cannot be provided by individual web service. The combination of services ...
Ran Tang, Ying Zou
COMCOM
2008
153views more  COMCOM 2008»
13 years 8 months ago
Available bandwidth estimation and admission control for QoS routing in wireless mesh networks
This article presents an integrated admission control and routing mechanism for multi-rate wireless mesh networks. Admission control depends on precise estimates of available band...
Mesut Ali Ergin, Marco Gruteser, Lin Luo, Dipankar...
EJWCN
2010
138views more  EJWCN 2010»
13 years 3 months ago
An Interference-Aware Admission Control Design for Wireless Mesh Networks
With the increasing popularity of wireless mesh networks (WMNs), the demand for multimedia services encompassing VoIP, multimedia streaming and interactive gaming is increasing rap...
Devu Manikantan Shila, Tricha Anjali
ACSAC
2004
IEEE
14 years 15 days ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
DSOM
2003
Springer
14 years 1 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung