Sciweavers

1897 search results - page 242 / 380
» eg 2007
Sort
View
ICSOC
2007
Springer
14 years 3 months ago
User-Driven Service Lifecycle Management - Adopting Internet Paradigms in Telecom Services
The user-centric service creation paradigm set out in Web 2.0 technologies on the Internet allows users to define and share their new content and applications. Open services and in...
Juan C. Yelmo, Rubén Trapero, José M...
ICWE
2007
Springer
14 years 3 months ago
On Embedding Task Memory in Services Composition Frameworks
With the increasing availability of Web services and adoption of services oriented paradigm, there is a growing need to dynamically compose services for realizing complex user task...
Rosanna Bova, Hye-Young Paik, Salima Hassas, Salim...
IFM
2007
Springer
245views Formal Methods» more  IFM 2007»
14 years 3 months ago
Co-simulation of Distributed Embedded Real-Time Control Systems
Development of computerized embedded control systems is difficult because it brings together systems theory, electrical engineering and computer science. The engineering and analys...
Marcel Verhoef, Peter Visser, Jozef Hooman, Jan F....
IFSA
2007
Springer
133views Fuzzy Logic» more  IFSA 2007»
14 years 3 months ago
Fuzzy Tree Mining: Go Soft on Your Nodes
Tree mining consists in discovering the frequent subtrees from a forest of trees. This problem has many application areas. For instance, a huge volume of data available from the In...
Federico Del Razo López, Anne Laurent, Pasc...
IH
2007
Springer
14 years 3 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...