Sciweavers

1403 search results - page 201 / 281
» Security Model for XML Data
Sort
View
IJMTM
2007
123views more  IJMTM 2007»
13 years 9 months ago
Semantic enterprise application integration standards
Large, industry-wide interoperability projects use syntax-based standards approaches to accomplish interoperable data exchange among enterprise applications. We are investigating S...
Nenad Anicic, Zoran Marjanovic, Nenad Ivezic, Albe...
NSF
2001
Springer
197views Computer Vision» more  NSF 2001»
14 years 2 months ago
A Collaborative Infrastructure for Mobile and Wireless Systems
Today‘s use of mobile phones is mostly for coordination purposes. It seems reasonable to assume that 3G and 4G high bandwidth systems will be used in a similar way. This paper th...
Lutz Michael Wegner, Morad Ahmad, Stefan Fröh...
ATVA
2008
Springer
90views Hardware» more  ATVA 2008»
13 years 12 months ago
Tree Pattern Rewriting Systems
Classical verification often uses abstraction when dealing with data. On the other hand, dynamic XML-based applications have become pervasive, for instance with the ever growing im...
Blaise Genest, Anca Muscholl, Olivier Serre, Marc ...
WSC
2007
14 years 8 days ago
Simulation of passenger check-in at a medium-sized US airport
Delays in the check-in system at an airport vary with times of the day, day of the week, and types of check-in modes chosen by the passengers. Extensive data collection of the che...
Simone Appelt, Rajan Batta, Li Lin, Colin G. Drury
ICDCS
2006
IEEE
14 years 4 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper