Sciweavers

446 search results - page 44 / 90
» SP-to-SP service ordering specification and its implementati...
Sort
View
BPSC
2009
184views Business» more  BPSC 2009»
13 years 8 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
SIGUCCS
2000
ACM
13 years 11 months ago
Windows 2000 Deployment Technical Challenges at the University of Colorado at Boulder
Microsoft Windows 2000 represents a major change in desktop and network operating systems. This latest Windows operating system includes many new features and technologies that wi...
Brad Judy, Alfred Roberts, David Bodnar
ANCS
2005
ACM
14 years 1 months ago
Framework for supporting multi-service edge packet processing on network processors
Network edge packet-processing systems, as are commonly implemented on network processor platforms, are increasingly required to support a rich set of services. These multi-servic...
Arun Raghunath, Aaron R. Kunze, Erik J. Johnson, V...
WDAG
2005
Springer
90views Algorithms» more  WDAG 2005»
14 years 1 months ago
Proving Atomicity: An Assertional Approach
Atomicity (or linearizability) is a commonly used consistency criterion for distributed services and objects. Although atomic object implementations are abundant, proving that algo...
Gregory Chockler, Nancy A. Lynch, Sayan Mitra, Jos...
GLOBECOM
2006
IEEE
14 years 1 months ago
Two-Level Dynamic Bandwidth Allocation for a Space-to-Ground Relay Network
Abstract-We address issues related to efficiency, fairness, endto-end delay minimization and Quality-of-Service in order to enable a flexible access and dynamic mission operation c...
Hui Zeng, Michael H. Hadjitheodosiou, John S. Bara...