Sciweavers

1490 search results - page 265 / 298
» The Logic of Authentication Protocols
Sort
View
IEEESCC
2008
IEEE
14 years 3 months ago
Byzantine Fault Tolerant Coordination for Web Services Business Activities
In this paper, we present a comprehensive study on the threats towards the coordination services for Web services business activities and explore the most optimal solution to miti...
Wenbing Zhao, Honglei Zhang
ATAL
2007
Springer
14 years 3 months ago
An event-driven approach for agent-based business process enactment
Agents enacting business processes in large open environments need to adaptively accommodate exceptions. Work on multiagent approaches can flexibly model business processes. This...
Payal Chakravarty, Munindar P. Singh
ICLP
2007
Springer
14 years 2 months ago
Universal Timed Concurrent Constraint Programming
Abstract In this doctoral work we aim at developing a rich timed concurrent constraint (tcc) based language with strong ties to logic. The new calculus called Universal Timed Concu...
Carlos Olarte, Catuscia Palamidessi, Frank Valenci...
WSFM
2007
Springer
14 years 2 months ago
Towards a Theory of Web Service Choreographies
A fundamental promise of service oriented architecture (SOA) lies in the ease of integrating sharable information, processes, and other resources through interactions among the sha...
Jianwen Su, Tevfik Bultan, Xiang Fu, Xiangpeng Zha...
ISCC
2006
IEEE
182views Communications» more  ISCC 2006»
14 years 2 months ago
CollECT: Collaborative Event deteCtion and Tracking in Wireless Heterogeneous Sensor Networks
Event detection and tracking are attractive research issues in the wireless sensor network (WSN). The paper proposes a fully distributed protocol, CollECT, to event detection and ...
Kuei-Ping Shih, Sheng-Shih Wang, Pao-Hwa Yang, Cha...