Sciweavers

1083 search results - page 200 / 217
» On the Use of Behavioural Equivalences for Web Services' Dev...
Sort
View
ISADS
1999
IEEE
14 years 22 days ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ECOWS
2006
Springer
14 years 3 days ago
A Multimedia-Specific Approach to WS-Agreement
WS-Agreement offers a general language and protocol to establish agreements between two parties. In principle, this generality enables a wide variety of domains to be covered. Yet...
Wilfried Jouve, Julien Lancia, Charles Consel, Cal...
LISA
2001
13 years 9 months ago
Macroscopic Internet Topology and Performance Measurements from the DNS Root Name Servers
We describe active measurements of topology and end-to-end latency characteristics between several of the DNS root servers and a subset of their clients using the skitter tool dev...
Marina Fomenkov, Kimberly C. Claffy, Bradley Huffa...
SIGMETRICS
2000
ACM
125views Hardware» more  SIGMETRICS 2000»
13 years 8 months ago
Resource management policies for e-commerce servers
Quality of service of e-commerce sites has been usually managed by the allocation of resources such as processors, disks, and network bandwidth, and by tracking conventional perfo...
Daniel A. Menascé, Rodrigo C. Fonseca, Virg...
NAR
2007
90views more  NAR 2007»
13 years 8 months ago
The SUPERFAMILY database in 2007: families and functions
The SUPERFAMILY database provides protein domain assignments, at the SCOP ‘superfamily’ level, for the predicted protein sequences in over 400 completed genomes. A superfamily...
Derek Wilson, Martin Madera, Christine Vogel, Cyru...