Trustworthy service composition with secure data transmission in sensor networks
As the basis of the Internet of Things (IoT), sensor networks have materialized its
computation and communication capability into anything in our modern lives. Service …
computation and communication capability into anything in our modern lives. Service …
An application-level approach for privacy-preserving virtual machine checkpointing
Virtualization has been widely adopted in recent years in the cloud computing platform to
improve server consolidation and reduce operating cost. Virtual Machine (VM) …
improve server consolidation and reduce operating cost. Virtual Machine (VM) …
Building reliable data pipelines for managing community data using scientific workflows
Y Simmhan, C Van Ingen, A Szalay… - 2009 Fifth IEEE …, 2009 - ieeexplore.ieee.org
The growing amount of scientific data from sensors and field observations is posing a
challenge to¿ data valets¿ responsible for managing them in data repositories. These …
challenge to¿ data valets¿ responsible for managing them in data repositories. These …
Information flow analysis of scientific workflows
Recently, scientific workflows have emerged as a platform for automating and accelerating
data processing and data sharing in scientific communities. Many scientific workflows have …
data processing and data sharing in scientific communities. Many scientific workflows have …
A scientific workflow model designer based on scientific information control nets
In this paper, we design and implement a scientific workflow process designer with a
conceptual building block depicting its architectural structure. The designer is theoretically …
conceptual building block depicting its architectural structure. The designer is theoretically …
scICN: Scientific information control nets
In this paper, we propose a formal description for representing the scientific workflow model
supporting process-driven scientific behaviors in data intensive experiment procedures and …
supporting process-driven scientific behaviors in data intensive experiment procedures and …
[PDF][PDF] Collaborative systems-finite state machines
I Ivan, C Ciurea, S Pavel - Informatica Economica, 2011 - core.ac.uk
In this paper the finite state machines are defined and formalized. There are presented the
collaborative banking systems and their correspondence is done with finite state machines …
collaborative banking systems and their correspondence is done with finite state machines …
[PDF][PDF] Reliable management of community data pipelines using scientific workflows
The pervasive availability of scientific data from sensors and field observations is posing a
challenge to data valets responsible for accumulating and managing them in data …
challenge to data valets responsible for accumulating and managing them in data …
Impact of Boundary-Scan Design On Delay Test
EK Vida-Torku - Proceedings International Test Conference 1992, 1992 - computer.org
We present an approach for building calling context information useful for program
understanding, performance analysis and optimizations. Our approach exploits a lightweight …
understanding, performance analysis and optimizations. Our approach exploits a lightweight …
Design and implementation of information flow-sensitive business processes
U Yildiz, C Godart - 2008 Sixth European Conference on Web …, 2008 - ieeexplore.ieee.org
Information flow control consists of planning the interactions of services in order to satisfy
different security restrictions concerning the propagation of information in a composition …
different security restrictions concerning the propagation of information in a composition …