Sciweavers

JSW
2007
116views more  JSW 2007»
13 years 11 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...
JSW
2007
141views more  JSW 2007»
13 years 11 months ago
Building Dependable and Secure Web Services
— Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services can ...
Louise E. Moser, P. Michael Melliar-Smith, Wenbing...
JSW
2007
106views more  JSW 2007»
13 years 11 months ago
Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies
Abstract— In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authenti...
Torsten Priebe, Wolfgang Dobmeier, Christian Schl&...
JSW
2007
81views more  JSW 2007»
13 years 11 months ago
Nonblocking Distributed Replication of Versioned Files
— In this paper, we propose a distributed data storage framework that supports unrestricted offline access. The system does not explicitly distinguish between connected and disc...
Lukás Hejtmánek, Ludek Matyska
JSW
2007
126views more  JSW 2007»
13 years 11 months ago
Efficient Evaluation of Multiple-Output Boolean Functions in Embedded Software or Firmware
— The paper addresses software and firmware implementation of multiple-output Boolean functions based on cascades of Look-Up Tables (LUTs). A LUT cascade is described as a means ...
Vaclav Dvorak
JSW
2007
98views more  JSW 2007»
13 years 11 months ago
Real Time Simulation of Medical Diagnosis with Confidence Levels on Distributed Knowledge Nodes
—Telemedicine has been researched to provide better care to people in the remote area via Internet. Enhancing the Telemedicine over Internet can be applied to multiple health-car...
Narongrit Waraporn
JSW
2007
165views more  JSW 2007»
13 years 11 months ago
In and out of Reality: Janus-Faced Location Awareness in Ubiquitous Games
— Many future ubiquitous devices will be able to determine their precise physical position using different types of localization techniques (e.g. GPS antennas for outdoor-, RFID ...
Alexander Höhfeld
JSW
2007
185views more  JSW 2007»
13 years 11 months ago
A Decision Support System base line Flexible Architecture to Intrusion Detection
—Becoming more competitive and more effective in the current scenes of Business and Public Administration, the organizations must be able to approach easily and quickly to the in...
Marcello Castellano, Giuseppe Mastronardi, Angela ...
JSW
2007
156views more  JSW 2007»
13 years 11 months ago
An Automatic Test Case Generation Framework for Web Services
— BPEL (Business Process Execution Language) as a de-facto standard for web service orchestration has drawn particularly attention from researchers and industries. BPEL is a semi...
Yongyan Zheng, Jiong Zhou, Paul Krause
JSW
2007
112views more  JSW 2007»
13 years 11 months ago
The Challenge of Training New Architects: an Ontological and Reinforcement-Learning Methodology
— This paper describes the importance of new skilled architects in the discipline of Software and Enterprise Architecture. Architects are often idealized as super heroes with a l...
Anabel Fraga, Juan Lloréns