Sciweavers

5523 search results - page 1066 / 1105
» Web service derivatives
Sort
View
ICDCS
2007
IEEE
14 years 4 months ago
Automated Storage Reclamation Using Temporal Importance Annotations
This work focuses on scenarios that require the storage of large amounts of data. Such systems require the ability to either continuously increase the storage space or reclaim spa...
Surendar Chandra, Ashish Gehani, Xuwen Yu
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 4 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
ATAL
2007
Springer
14 years 4 months ago
Modelling the provenance of data in autonomous systems
Determining the provenance of data, i.e. the process that led to that data, is vital in many disciplines. For example, in science, the process that produced a given result must be...
Simon Miles, Steve Munroe, Michael Luck, Luc Morea...
CSEE
2007
Springer
14 years 4 months ago
Towards a European Master Programme on Global Software Engineering
This paper presents a European Master programme on Global Software Engineering (SE), being put forward by four leading institutions from Sweden, UK, Netherlands and Italy. The Glo...
Patricia Lago, Henry Muccini, Ljerka Beus-Dukic, I...
ECMDAFA
2007
Springer
122views Hardware» more  ECMDAFA 2007»
14 years 4 months ago
Model Transformation from OWL-S to BPEL Via SiTra
Although there are a large number of academic and industrial model transformation frameworks available, allowing specification, implementation, maintenance and documentation of mod...
Behzad Bordbar, Gareth Howells, Michael Evans, Ath...
« Prev « First page 1066 / 1105 Last » Next »