Sciweavers

2272 search results - page 348 / 455
» Validity Invariants and Effects
Sort
View
JNW
2008
126views more  JNW 2008»
15 years 3 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
DPD
2007
165views more  DPD 2007»
15 years 3 months ago
Context-based caching and routing for P2P web service discovery
In modern heterogeneous environments, such as mobile, pervasive and ad-hoc networks, architectures based on web services offer an attractive solution for effective communication a...
Christos Doulkeridis, Vassilis Zafeiris, Kjetil N&...
JWSR
2008
98views more  JWSR 2008»
15 years 3 months ago
Mining and Improving Composite Web Services Recovery Mechanisms
: Ensuring composite services reliability is a challenging problem. Indeed, due to the inherent autonomy and heterogeneity of Web services it is difficult to predict and reason abo...
Sami Bhiri, Walid Gaaloul, Claude Godart
JIPS
2006
116views more  JIPS 2006»
15 years 3 months ago
A Method for Automatic Generation of OWL-S Service Ontology
: We present in this paper the methodology for automatic generation of OWL-S service model ontology along with the results and issues. First, we extract information related to atom...
Jin-Hyuk Yang, In-Jeong Chung
162
Voted
EJIS
2007
150views more  EJIS 2007»
15 years 3 months ago
e-Government information systems: Evaluation-led design for public value and client trust
e-Government systems differ from commercial information systems (IS) in that they frequently encompass strategic goals that go beyond efficiency, effectiveness and economy, and in...
Michael Grimsley, Anthony Meehan