Sciweavers

292 search results - page 55 / 59
» Service discovery supported by task models
Sort
View
SAC
2004
ACM
14 years 1 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
AFRIGRAPH
2003
ACM
14 years 1 months ago
Development of a real time image based object recognition method for mobile AR-devices
In this paper we describe an image based object recognition and tracking method for mobile AR-devices and the correlative process to generate the required data. The object recogni...
Jürgen Gausemeier, Jürgen Fründ, Ca...
SASO
2010
IEEE
13 years 5 months ago
Extracting Overlay Invariants of Distributed Systems for Autonomic System Management
Many large-scale distributed systems have been built with great complexity to run Internet services. Due to the heterogeneity and dynamics of complex systems, it is very difficult ...
Hanhuai Shan, Guofei Jiang, Kenji Yoshihira
ESORICS
2009
Springer
14 years 8 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
BPM
2009
Springer
169views Business» more  BPM 2009»
14 years 2 months ago
Analyzing Resource Behavior Using Process Mining
It is vital to use accurate models for the analysis, design, and/or control of business processes. Unfortunately, there are often important discrepancies between reality and models...
Joyce Nakatumba, Wil M. P. van der Aalst