Sciweavers

441 search results - page 84 / 89
» Mapping a Business Process Model to a Semantic Web Service M...
Sort
View
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 2 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
14 years 20 days ago
Data-driven Methodology to Extending Workflows to E-services over the Internet
E-services refer to the services offered over the Internet. The globalization of economy accelerates the provision of e-services across organizations. Instead of being built from ...
Shing-Chi Cheung, Dickson K. W. Chiu, Sven Till
ESOP
2008
Springer
13 years 9 months ago
Open Bisimulation for the Concurrent Constraint Pi-Calculus
Abstract. The concurrent constraint pi-calculus (cc-pi-calculus) has been introduced as a model for concluding Service Level Agreements. The cc-pi calculus combines the synchronous...
Maria Grazia Buscemi, Ugo Montanari
ATAL
2010
Springer
13 years 8 months ago
ALIVE: an agent-based framework for dynamic and robust service-oriented applications
Service-oriented systems are becoming more and more nodes in a digital, dynamic ecosystem requiring the identification and establishment of flexible, spontaneous collaboration act...
Javier Vázquez-Salceda, Wamberto Weber Vasc...
ICSOC
2007
Springer
14 years 1 months ago
Pattern Based SOA Deployment
Abstract. A key function of a Service Oriented Architecture is the separation between business logic and the platform of its implementation and deployment. Much of the focus in SOA...
William Arnold, Tamar Eilam, Michael H. Kalantar, ...