The role of service granularity in a successful SOA realization a case study
N Kulkarni, V Dwivedi - 2008 IEEE Congress on Services-Part I, 2008 - ieeexplore.ieee.org
This paper presents the case study of a leading US financial Institution International
Financial and Brokerage Services (IFBS), which faced SOA realization issues while it …
Financial and Brokerage Services (IFBS), which faced SOA realization issues while it …
Sharing of resources: Theoretical background and a case study
T Otčenášková, K Kolerová, V Bureš - Procedia-Social and Behavioral …, 2014 - Elsevier
Sharing of resources is connected with several issues needed to be managed appropriately.
Therefore, possibilities of sharing of information, knowledge, technologies and other items in …
Therefore, possibilities of sharing of information, knowledge, technologies and other items in …
A matchmaking algorithm for resource discovery in multi-user settings
Dynamic collaborative environments enabled with multiple computational devices, software
and files have always had difficulty sharing these resources in a practical way. Traditionally …
and files have always had difficulty sharing these resources in a practical way. Traditionally …
[PDF][PDF] Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
N Yusoff - 2014 - psasir.upm.edu.my
In developing countries, the numbers of vehicles on the roads have rapidly increased from
year to year. According to Santos et al.(2011), the rate of vehicle growth has exceeded …
year to year. According to Santos et al.(2011), the rate of vehicle growth has exceeded …
Flexible Bimodal Recognition of Collaborators in Pervasive Environments
JS Martínez-Delgado, S Mendoza… - 2013 12th Mexican …, 2013 - ieeexplore.ieee.org
We propose an access control method based on the combination of two biometric
recognitions: voice and face. In particular, our face recognition algorithm aims at determining …
recognitions: voice and face. In particular, our face recognition algorithm aims at determining …
A Semantic Approach to Shared Resource Discovery
The current available technologies have not been fully exploited to assist collaborators to
perform activities that are considered as time/effort wasting and tedious, but which cannot be …
perform activities that are considered as time/effort wasting and tedious, but which cannot be …
Recognizing collaborators using a flexible approach based on face and voice biometrics
JS Martínez-Delgado, S Mendoza… - 2013 10th International …, 2013 - ieeexplore.ieee.org
In this paper, we propose an access control method based on the combination of two
biometric recognitions: voice and face. This method can be integrated into several systems …
biometric recognitions: voice and face. This method can be integrated into several systems …
[PDF][PDF] Unidad Zacatenco Departamento de Computación
DIC Vázquez - 2016 - delta.cs.cinvestav.mx
La criptografıa es la práctica y estudio de técnicas para asegurar las comunicaciones en
presencia de terceras personas llamadas adversarios. La criptografıa toma como base …
presencia de terceras personas llamadas adversarios. La criptografıa toma como base …