Sciweavers

387 search results - page 59 / 78
» Pervasive Enablement of Business Processes
Sort
View
CCS
2007
ACM
14 years 1 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
IEEESCC
2008
IEEE
14 years 2 months ago
Built-to-Order Service Engineering for Enterprise IT Discovery
Enterprise IT environments are complex: business applications rely on distributed middleware running on diverse hardware with components depending on each other in many unexpected...
Nikolai Joukov, Murthy V. Devarakonda, Kostas Mago...
APN
2005
Springer
14 years 1 months ago
Can I Execute My Scenario in Your Net?
This paper describes the verification module (the VipVerify Module) of the VipTool [4]. VipVerify allows to verify whether a given scenario is an execution of a system model, give...
Gabriel Juhás, Robert Lorenz, Jörg Des...
PDP
2003
IEEE
14 years 28 days ago
Architectural concerns in distributed and mobile collaborative systems
Organizations increasingly coordinate their product and service development processes to deliver their products and services as fast as possible, and to involve employees, custome...
Schahram Dustdar, Harald Gall
APN
2006
Springer
13 years 11 months ago
Can I Execute My Scenario in Your Net? VipTool Tells You!
This paper describes the verification module (the VipVerify Module) of the VipTool [4]. VipVerify allows to verify whether a given scenario is an execution of a system model, given...
Robin Bergenthum, Jörg Desel, Gabriel Juh&aac...