Sciweavers

591 search results - page 22 / 119
» Securing the Broker Pattern
Sort
View
CLUSTER
2007
IEEE
13 years 8 months ago
Meta-communications in component-based communication frameworks for grids
— Applications are faced with several network-related problems on current grids: heterogeneous networks, firewalls, NAT, private IP addresses, non-routed networks, performance p...
Alexandre Denis
MIDDLEWARE
2005
Springer
14 years 2 months ago
Composite Subscriptions in Content-Based Publish/Subscribe Systems
Distributed publish/subscribe systems are naturally suited for processing events in distributed systems. However, support for expressing patterns about disparate events and algorit...
Guoli Li, Hans-Arno Jacobsen
MCS
2007
Springer
13 years 8 months ago
The pricing of options for securities markets with delayed response
The analogue of Black–Scholes formula for vanilla call option price in conditions of (B, S)-securities market with delayed response is derived. A special case of continuous-time...
Yuriy Kazmerchuk, Anatoliy Swishchuk, Jianhong Wu
MVA
1998
117views Computer Vision» more  MVA 1998»
13 years 8 months ago
A system for a new two-dimensional code: Secure 2D code
Abstract. A new 2D code called Secure 2D code is designed in this paper, both encoder and decoder are also proposed. Secure 2D code can store any kind of data and provides high sec...
Chung-Tsai Yeh, Ling-Hwei Chen
FASE
2009
Springer
14 years 3 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel