Sciweavers

6844 search results - page 1290 / 1369
» Web Service Security
Sort
View
NOMS
2010
IEEE
136views Communications» more  NOMS 2010»
13 years 7 months ago
Supporting System-wide Similarity Queries for networked system management
Abstract— Today’s networked systems are extensively instrumented for collecting a wealth of monitoring data. In this paper, we propose a framework called System-wide Similarity...
Songyun Duan, Hui Zhang 0002, Guofei Jiang, Xiaoqi...
RV
2010
Springer
172views Hardware» more  RV 2010»
13 years 7 months ago
Recovery Tasks: An Automated Approach to Failure Recovery
Abstract. We present a new approach for developing robust software applications that breaks dependences on the failed parts of an application’s execution to allow the rest of the...
Brian Demsky, Jin Zhou, William Montaz
TWEB
2010
164views more  TWEB 2010»
13 years 7 months ago
A distributed service-oriented architecture for business process execution
The Business Process Execution Language (BPEL) standardizes the development of composite enterprise applications that make use of software components exposed as Web services. BPEL...
Guoli Li, Vinod Muthusamy, Hans-Arno Jacobsen
WS
2010
ACM
13 years 7 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
AVI
2010
13 years 7 months ago
Seeing the self in the washing machine: the deep affordance of 2.0 philosophy in the household appliance domain
The acceleration of rhythm of everyday life requires efficiency and flexibility in daily routines. The real expectations and needs of people concerning intelligent home devices sh...
Caterina Calefato, Enrico Frumento, Monica Milani,...
« Prev « First page 1290 / 1369 Last » Next »