Sciweavers

392 search results - page 57 / 79
» Supporting Flexible Competency Frameworks
Sort
View
HPDC
2008
IEEE
13 years 9 months ago
Eliminating the middleman: peer-to-peer dataflow
Efficiently executing large-scale, data-intensive workflows such as Montage must take into account the volume and pattern of communication. When orchestrating data-centric workflo...
Adam Barker, Jon B. Weissman, Jano I. van Hemert
TGIS
2002
118views more  TGIS 2002»
13 years 8 months ago
A Dynamic Architecture for Distributing Geographic Information Services
Traditional GISystems are no longer appropriate for modern distributed, heterogeneous network environments due to their closed architecture, and their lack of interoperability, reu...
Ming-Hsiang Tsou, Barbara P. Buttenfield
SOCIALCOM
2010
13 years 6 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
SODA
2010
ACM
200views Algorithms» more  SODA 2010»
14 years 6 months ago
Fully-Functional Succinct Trees
We propose new succinct representations of ordinal trees, which have been studied extensively. It is known that any n-node static tree can be represented in 2n + o(n) bits and a l...
Kunihiko Sadakane, Gonzalo Navarro
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 3 months ago
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Nick Cook, Paul Robinson, Santosh K. Shrivastava