Sciweavers

328 search results - page 45 / 66
» On the Enactability of Business Protocols
Sort
View
IEEEARES
2010
IEEE
14 years 4 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
MAGS
2008
104views more  MAGS 2008»
13 years 9 months ago
Retractable contract network for empowerment in workforce scheduling
This paper is about business modelling and negotiation protocol design in distributed scheduling, where individual agents have individual (potentially conflicting) interests. It i...
Edward P. K. Tsang, Timothy Gosling, Botond Virgin...
LCN
2006
IEEE
14 years 3 months ago
Achieving Fairness in IEEE 802.11 Ad Hoc Networks
IEEE 802.11 has become the main technology in local area wireless networks. However, performance anomalies, especially, in terms of fairness, arise in its use in ad hoc networks. ...
Fanilo Harivelo, Pascal Anelli
ICMB
2005
IEEE
98views Business» more  ICMB 2005»
14 years 3 months ago
Security Issues in SIP Signaling in Wireless Networks and Services
SIP appears to be a powerful and useful signaling protocol supporting mobility for wireless IP networks but it has inherent weaknesses and dangers. This paper is a study on the se...
Elthea T. Lakay, Johnson I. Agbinya
ADBIS
2004
Springer
153views Database» more  ADBIS 2004»
14 years 3 months ago
Cooperative Transaction Processing between Clients and Servers
Business rules are often implemented as stored procedures in a database server. These procedures are triggered by various clients, but the execution load is fully centralized on th...
Steffen Jurk, Ulf Leser, José-Luis Marzo