Sciweavers

6844 search results - page 1292 / 1369
» Web Service Security
Sort
View
SOCA
2010
IEEE
13 years 6 months ago
Exploiting multicores to optimize business process execution
While modern CPUs offer an increasing number of cores with shared caches, prevailing execution engines for business processes, workflows, or Web service compositions have not been ...
Achille Peternier, Daniele Bonetta, Cesare Pautass...
SOCIALCOM
2010
13 years 6 months ago
Learning to Predict Ad Clicks Based on Boosted Collaborative Filtering
This paper addresses the topic of social advertising, which refers to the allocation of ads based on individual user social information and behaviors. As social network services (e...
Teng-Kai Fan, Chia-Hui Chang
HPDC
2009
IEEE
13 years 6 months ago
Evaluating the utility of content delivery networks
Content Delivery Networks (CDNs) balance costs and quality in services related to content delivery. This has urged many Web entrepreneurs to make contracts with CDNs. In the liter...
Konstantinos Stamos, George Pallis, Athena Vakali,...
ICWS
2009
IEEE
13 years 6 months ago
A Flexible Approach for Automatic Process Decentralization Using Dependency Tables
Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation points...
Walid Fdhila, Ustun Yildiz, Claude Godart
CCR
2011
13 years 3 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
« Prev « First page 1292 / 1369 Last » Next »