Sciweavers

1801 search results - page 332 / 361
» Implementation-Oriented Secure Architectures
Sort
View
CONCURRENCY
2006
111views more  CONCURRENCY 2006»
13 years 10 months ago
ScyFlow: an environment for the visual specification and execution of scientific workflows
With the advent of grid technologies, scientists and engineers are building more and more complex applications to utilize distributed grid resources. The core grid services provid...
Karen M. McCann, Maurice Yarrow, Adrian De Vivo, P...
DI
2006
67views more  DI 2006»
13 years 10 months ago
A portable network forensic evidence collector
A small portable network forensic evidence collection device is presented which is built using inexpensive embedded hardware and open source software. The device oers several mode...
Bruce J. Nikkel
DKE
2006
79views more  DKE 2006»
13 years 10 months ago
The view-based approach to dynamic inter-organizational workflow cooperation
This paper presents a novel approach to inter-organizational workflow cooperation. Our goal is to provide support for organizations which are involved in a shared but not pre-mode...
Issam Chebbi, Schahram Dustdar, Samir Tata
ENTCS
2006
158views more  ENTCS 2006»
13 years 10 months ago
Towards a Subject-Oriented Model-Driven Framework
Model-Driven Architecture is an approach of the OMG, its objective is to tackle problems such as: the high availability that a software product requires to be ready for use, the h...
Pablo Amaya, Carlos González, Juan M. Muril...
IJNSEC
2006
205views more  IJNSEC 2006»
13 years 10 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park