Sciweavers

1528 search results - page 179 / 306
» Performance Assertion Checking
Sort
View
SEMWEB
2005
Springer
15 years 8 months ago
Representing Web Service Policies in OWL-DL
Abstract. Recently, there have been a number of proposals for languages for expressing web service constraints and capabilities, with WSPolicy and WSPL leading the way. The propose...
Vladimir Kolovski, Bijan Parsia, Yarden Katz, Jame...
VSTTE
2005
Springer
15 years 8 months ago
WYSINWYX: What You See Is Not What You eXecute
What You See Is Not What You eXecute: computers do not execute source-code programs; they execute machine-code programs that are generated from source code. Not only can the WYSINW...
Gogul Balakrishnan, Thomas W. Reps, David Melski, ...
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 8 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
SGAI
2004
Springer
15 years 7 months ago
OntoSearch: An Ontology Search Engine
Reuse of knowledge bases and the semantic web are two promising areas in knowledge technologies. Given some user requirements, finding the suitable ontologies is an important task...
Yi Zhang, Wamberto Weber Vasconcelos, Derek H. Sle...
HOTOS
2003
IEEE
15 years 7 months ago
Secure Data Replication over Untrusted Hosts
Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more freq...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...