Sciweavers

2442 search results - page 126 / 489
» Secure Service Orchestration
Sort
View
COREGRID
2007
Springer
14 years 2 months ago
Co-Allocating Compute and Network Resources
Distributed applications or workflows need to access and use compute, storage and network resources simultaneously or chronologically coordinated respectively. Examples are distri...
Thomas Eickermann, Lidia Westphal, Oliver Wäl...
INFOCOM
2003
IEEE
14 years 1 months ago
Smooth Multirate Multicast Congestion Control
— A significant impediment to deployment of multicast services is the daunting technical complexity of developing, testing and validating congestion control protocols fit for w...
Gu-In Kwon, John W. Byers
IIWAS
2008
13 years 9 months ago
Using conditional transformations for semantic user interface adaptation
The rapid growth of mobile Internet use requires highly flexible and adaptable user interfaces for web applications. Contextual data from various sources as for example device HMI...
Pascal Bihler, Merlin Fotsing, Günter Kniesel...
CCS
1994
ACM
14 years 12 days ago
Endorsements, Licensing, and Insurance for Distributed System Services
Clients in a distributedsystem place their con dencein many servers, and servers themselves rely on other servers for le storage, authentication, authorization, and payment. When ...
Gennady Medvinsky, Charlie Lai, B. Clifford Neuman
BPSC
2009
184views Business» more  BPSC 2009»
13 years 9 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen