Sciweavers

1989 search results - page 373 / 398
» Integrity Management in Component Based Systems
Sort
View
ESCIENCE
2007
IEEE
14 years 1 months ago
Binary Data Transfer Performance over High-Latency Networks Using Web Service Attachments
One of the objectives of e-Research is to help scientists to accomplish their research, including scientific experiments, more effectively and efficiently. Web services provide ...
Donglai Zhang, Paul D. Coddington, Andrew L. Wende...
ICC
2007
IEEE
112views Communications» more  ICC 2007»
14 years 1 months ago
Design of a Stabilizing Second-Order Congestion Controller for Large-Delay Networks
—This paper addresses the problem of the stability of congestion control for networks with large round-trip communication delays. Nearly all the existed AQM schemes neglect the i...
Jianxin Wang, Liang Rong, Guojun Wang, Weijia Jia,...
CCS
2007
ACM
14 years 1 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ADC
2006
Springer
130views Database» more  ADC 2006»
14 years 1 months ago
A two-phase rule generation and optimization approach for wrapper generation
Web information extraction is a fundamental issue for web information management and integrations. A common approach is to use wrappers to extract data from web pages or documents...
Yanan Hao, Yanchun Zhang
IUI
2003
ACM
14 years 24 days ago
Supporting plan authoring and analysis
Interactive tools to help users author plans or processes are essential in a variety of domains. KANAL helps users author sound plans by simulating them, checking for a variety of...
Jihie Kim, Jim Blythe