Sciweavers

1217 search results - page 148 / 244
» Multi-dimensional service compositions
Sort
View
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 9 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
GRID
2008
Springer
13 years 8 months ago
Cost and accuracy sensitive dynamic workflow composition over grid environments
A myriad of recent activities can be seen towards dynamic workflow composition for processing complex and data intensive problems. Meanwhile, the simultaneous emergence of the gri...
David Chiu, Sagar Deshpande, Gagan Agrawal, Rongxi...
CONCURRENCY
2010
127views more  CONCURRENCY 2010»
13 years 8 months ago
Formation of virtual organizations in grids: a game-theoretic approach
Applications require the composition of resources to execute in a grid computing environment. The Grid Service Providers (GSPs), the owners of the computational resources, must for...
Thomas E. Carroll, Daniel Grosu
CDVE
2007
Springer
156views Visualization» more  CDVE 2007»
14 years 2 months ago
Semantic Web Services Discovery System with QoS for Enhanced Web Services Quality
Semantic Web Services are the key technology providing services for the users’ convenience in the semantic web environment. Many companies in various fields are researching and d...
Okkyung Choi, Heejai Choi, Zoonky Lee, Sangyong Ha...
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 5 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha