Sciweavers

249 search results - page 35 / 50
» Validating a Web Service Security Abstraction by Typing
Sort
View
SOCA
2007
IEEE
14 years 1 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
CLUSTER
2009
IEEE
14 years 2 months ago
MDCSim: A multi-tier data center simulation, platform
Abstract—Performance and power issues are becoming increasingly important in the design of large cluster based multitier data centers for supporting a multitude of services. Desi...
Seung-Hwan Lim, Bikash Sharma, Gunwoo Nam, Eun-Kyo...
ER
2003
Springer
129views Database» more  ER 2003»
14 years 27 days ago
Extending Conceptual Models for Web Based Applications
Abstract. The next phase envisioned for the World Wide Web is automated ad-hoc interaction between intelligent agents, web services, databases and semantic web enabled applications...
Phillipa Oaks, Arthur H. M. ter Hofstede, David Ed...
ERCIMDL
1998
Springer
146views Education» more  ERCIMDL 1998»
13 years 12 months ago
METU-Emar: An Agent-Based Electronic Marketplace on the Web
Abstract. In this paper, we describe a scenario for a distributed marketplace on the Web where resource discovery agents find out about resources that may want to join the marketpl...
Asuman Dogac, Ilker Durusoy, Sena Nural Arpinar, E...
INFOCOM
2006
IEEE
14 years 1 months ago
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Kui Ren, Wenjing Lou, Yanchao Zhang