Sciweavers

273 search results - page 46 / 55
» Invisible Deployment of Integration Processes
Sort
View
SAC
2010
ACM
13 years 6 months ago
Cooperation enablement for centralistic early warning systems
From large-scale acquisition of information on security incidents by early warning systems (EWS) arises the opportunity to draw up a situation picture that allows detection of tre...
Ulrich Flegel, Johannes Hoffmann, Michael Meier
ICWS
2009
IEEE
13 years 5 months ago
QoS-Driven Adaptation of BPEL Scenario Execution
BPEL/WSBPEL is the predominant approach for combining individual web services into integrated business processes, allowing for the specification of their sequence, control flow an...
Christos Kareliotis, Costas Vassilakis, Stathis Ro...
TASLP
2011
13 years 3 months ago
Advances in Missing Feature Techniques for Robust Large-Vocabulary Continuous Speech Recognition
— Missing feature theory (MFT) has demonstrated great potential for improving the noise robustness in speech recognition. MFT was mostly applied in the log-spectral domain since ...
Maarten Van Segbroeck, Hugo Van Hamme
EDOC
2011
IEEE
12 years 7 months ago
Resource and Agreement Management in Dynamic Crowdcomputing Environments
Abstract—Open Web-based and social platforms dramatically influence models of work. Today, there is an increasing interest in outsourcing tasks to crowdsourcing environments tha...
Harald Psaier, Florian Skopik, Daniel Schall, Scha...
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
14 years 1 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty