Sciweavers

1083 search results - page 178 / 217
» On the Use of Behavioural Equivalences for Web Services' Dev...
Sort
View
CGO
2006
IEEE
14 years 2 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
BPSC
2009
184views Business» more  BPSC 2009»
13 years 9 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
EDBTW
2010
Springer
14 years 1 months ago
Declarative scheduling in highly scalable systems
In modern architectures based on Web Services or Cloud Computing, a very large number of user requests arrive concurrently and has to be scheduled for execution constrained by cor...
Christian Tilgner
DSOM
2005
Springer
14 years 1 months ago
SLA Design from a Business Perspective
Abstract. A method is proposed whereby values for Service Level Objectives (SLOs) of an SLA can be chosen to reduce the sum IT infrastructure cost plus business financial loss. Bu...
Jacques Philippe Sauvé, Filipe Marques, Ant...
CSREAEEE
2006
115views Business» more  CSREAEEE 2006»
13 years 10 months ago
A Framework for Smart e-Trader System for UAE Stock Markets
- The fast development in computing and communication has strongly changed the dynamics of financial markets. More people are trading online through the Web instead of using full-s...
Emad Bataineh, Fatma Al Amir, Hanan Ibraheem, Hess...