Sciweavers

173 search results - page 26 / 35
» Modelling Quality of Protection in Outsourced Business Proce...
Sort
View
DSN
2006
IEEE
14 years 2 months ago
Designing dependable storage solutions for shared application environments
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...
ICWS
2008
IEEE
13 years 10 months ago
A Framework for Verifying SLA Compliance in Composed Services
Service level agreements (SLAs) impose many nonfunctional requirements on services. Business analysts specify and check these requirements in business process models using tools s...
Hua Xiao, Brian Chan, Ying Zou, Jay W. Benayon, Bi...
JBI
2007
104views Bioinformatics» more  JBI 2007»
13 years 8 months ago
Anatomy of data integration
Producing reliable information is the ultimate goal of data processing. The ocean of data created with the advances of science and technologies calls for integration of data comin...
Olga Brazhnik, John F. Jones
CAISE
2003
Springer
14 years 1 months ago
Conceptual Modelling in Practice - Myth or Reality?
Conceptual modelling is thought (by academics at least) to be a key activity of Business Systems Analysis. For decades, comprehensive research has been conducted on related topics ...
Islay Davies, Peter Green, Michael Rosemann
WWW
2005
ACM
14 years 9 months ago
Ensuring required failure atomicity of composite Web services
The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...
Sami Bhiri, Olivier Perrin, Claude Godart