Academic literature on the topic 'Timed business protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Timed business protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Timed business protocols"
MOKHTARI-ASLAOUI, KARIMA, SALIMA BENBERNOU, SOROR SAHRI, VASILIOS ANDRIKOPOULOS, FRANK LEYMANN, and MOHAND-SAID HACID. "TIMED PRIVACY-AWARE BUSINESS PROTOCOLS." International Journal of Cooperative Information Systems 21, no. 02 (June 2012): 85–109. http://dx.doi.org/10.1142/s0218843012500013.
Full textElabd, Emad, Emmanuel Coquery, and Mohand-Said Hacid. "From Implicit to Explicit Transitions in Business Protocols." International Journal of Web Services Research 9, no. 4 (October 2012): 69–95. http://dx.doi.org/10.4018/jwsr.2012100104.
Full textAlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun, and Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.
Full textBiornstad, Biorn, Cesare Pautasso, and Gustavo Alonso. "Enforcing web services business protocols at run-time: a process-driven approach." International Journal of Web Engineering and Technology 2, no. 4 (2006): 396. http://dx.doi.org/10.1504/ijwet.2006.010422.
Full textRao, N. H. "Electronic Commerce and Opportunities for Agribusiness in India." Outlook on Agriculture 32, no. 1 (March 2003): 29–33. http://dx.doi.org/10.5367/000000003101294235.
Full textUBERMORGEN, /. "Everything is always (the liquid protocol)." Finance and Society 2, no. 2 (December 19, 2016): 175–79. http://dx.doi.org/10.2218/finsoc.v2i2.1731.
Full textSayeed, Sarwar, and Hector Marco-Gisbert. "Proof of Adjourn (PoAj): A Novel Approach to Mitigate Blockchain Attacks." Applied Sciences 10, no. 18 (September 22, 2020): 6607. http://dx.doi.org/10.3390/app10186607.
Full textHerschel, Richard T., and Nicolle Clements. "The Importance of Storytelling in Business Intelligence." International Journal of Business Intelligence Research 8, no. 1 (January 2017): 26–39. http://dx.doi.org/10.4018/ijbir.2017010102.
Full textRigin, Anton Mikhailovich, and Sergey Andreevich Shershakov. "Method of Performance Analysis of Time-Critical Applications Using DB-Nets." Proceedings of the Institute for System Programming of the RAS 33, no. 3 (2021): 109–22. http://dx.doi.org/10.15514/ispras-2021-33(3)-9.
Full textJain, Tarun, and Bijendra Nath Jain. "Infection Testing at Scale: An Examination of Pooled Testing Diagnostics." Vikalpa: The Journal for Decision Makers 46, no. 1 (March 2021): 13–26. http://dx.doi.org/10.1177/02560909211018906.
Full textDissertations / Theses on the topic "Timed business protocols"
Ponge, Julien Nicolas Computer Science & Engineering Faculty of Engineering UNSW. "Model based analysis of time-aware web services interactions." Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43525.
Full textElabd, Emad. "Compliance of Web services over a high level specification." Thesis, Lyon 1, 2011. http://www.theses.fr/2011LYO10122/document.
Full textCurrently, Web services technology is rapidly move forward supported by major players in the field of information systems. Web services applications are loosely coupled and usable in an automatic way via the use of a set of standards based on XML. Beside the syntactic description of messages, there is a need for the semantic description of the behavior of services. Indeed, whether in the design of a service or composition of services, it is important to check compliance with a set of specifications. Enriching services descriptions by including their behaviors is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of message exchanges. Web services use access control policies (ACP) to restrict the access to authorized consumer. These policies should be a part of the service description. In this thesis, the interoperability analysis in terms of AC after the formalization of the Web services annotated with the access control (AC) is performed. In addition, we present an approach for embedding the checking tools in the AC enforcement architecture to guarantee the errors free interaction. The ACP and the credentials are presented as ontology in order to benefit from the flexibility offered by subsumption on concepts. Web services choreography is used in the design phase of complex peer-to-peer applications in which each peer can be implemented by a Web service. Therefore, selecting Web services for choreography implementation using the compatibility checking approach with access control is one of the objectives of our research. In this work, the business protocol models of the Web service are extended by adding information to the message on each transition about the service in which this message will sent to or received from. We define and verify Web service compatibility in order to see if (and how) several services can have interactions based on their protocols. This approach will help the designers to select Web services in an easy way and verify if they can implement the required choreography or not by checking the compatibly using our approach
Books on the topic "Timed business protocols"
Ovodenko, Alexander. Producers, Trade Groups, and the Design of Global Environmental Regimes. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190677725.003.0006.
Full textCalloway, Colin G. Treaties and Treaty Making. Edited by Frederick E. Hoxie. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199858897.013.34.
Full textBook chapters on the topic "Timed business protocols"
Copei, Sebastian, Manuel Wickert, and Albert Zündorf. "Certification as a Service." In Agile Processes in Software Engineering and Extreme Programming – Workshops, 203–10. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58858-8_21.
Full textEngel, Markus, Christopher Kramer, Tobias Braun, Dennis Christmann, and Reinhard Gotzhein. "BiPS – A Real-Time-Capable Protocol Framework for Wireless Networked Control Systems and Its Application." In E-Business and Telecommunications, 313–36. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11039-0_15.
Full textNorville, Richard S., Kamesh Namuduri, and Ravi Pendse. "Node Authentication in Networks Using Zero-Knowledge Proofs." In Web Services Security and E-Business, 142–64. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-168-1.ch008.
Full textRabadi, Yousef E., and Joan Lu. "Building a Secured XML Real-Time Interactive Data Exchange Architecture." In Ontologies and Big Data Considerations for Effective Intelligence, 327–412. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2058-0.ch008.
Full textRabadi, Yousef E., and Joan Lu. "Building a Secured XML Real-Time Interactive Data Exchange Architecture." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 270–357. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch013.
Full textVukovic, Maja, and Claudio Bartolini. "Towards Crowd-Driven Business Processes." In Handbook of Research on E-Business Standards and Protocols, 412–29. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0146-8.ch019.
Full textPoon, Simpson. "Future of Small Business E-Commerce." In Encyclopedia of Information Science and Technology, First Edition, 1253–56. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch221.
Full textLee, Byung Kwan, Seung Hae Yang, and Tai-Chi Lee. "A SEEP Protocol Design Using 3BC, ECC(F2m) and HECC Algorithm." In Business Data Communications and Networking, 328–45. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-274-9.ch013.
Full textVuković, Maja, and Claudio Bartolini. "Towards Crowd-Driven Business Processes." In Crowdsourcing, 173–92. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8362-2.ch009.
Full textLin, Koong, Chad Lin, and Huei Leu. "Decision Analysis for Business to Adopt RFID." In Ubiquitous and Pervasive Computing, 1219–27. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch076.
Full textConference papers on the topic "Timed business protocols"
Mokhtari, Karima, Salima Benbernou, Mohsen Rouached, Frank Leyman, and Mohand-Said Hacid. "Privacy Time-Related Analysis in Business Protocols." In 2009 IEEE International Conference on Web Services (ICWS). IEEE, 2009. http://dx.doi.org/10.1109/icws.2009.87.
Full textXiang, Mantian, Lihua Sun, and Lihong Li. "Time-diffusion synchronization protocols in wireless sensor networks." In 2011 International Conference on E-Business and E-Government (ICEE). IEEE, 2011. http://dx.doi.org/10.1109/icebeg.2011.5882272.
Full text"TOWARDS RUN-TIME PROTOCOL ANOMALY DETECTION AND VERIFICATION." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001395802990304.
Full textAlexieva, Sonya. "COMMUNICATIONS IN TOURISM IN TIMES OF PANDEMIC: FROM CONVENTIONAL TO DIGITAL CONNECTIVITY." In TOURISM AND CONNECTIVITY 2020. University publishing house "Science and Economics", University of Economics - Varna, 2020. http://dx.doi.org/10.36997/tc2020.655.
Full textMekid, Samir, and Usman Akbar. "Configuration and Business Protocol of International Load Sharing of Manufacturing and its Challenges Under I4.0 and IIoT." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10158.
Full textMa, Haiying, and Ning Cai. "Swarm Stability of Compartmental Networks with Linear Time-Invariant High-Order Dynamical Protocol." In 2011 International Conference on Business Computing and Global Informatization (BCGIn). IEEE, 2011. http://dx.doi.org/10.1109/bcgin.2011.138.
Full textResner, Davi, and Antonio Augusto Frohlich. "TSTP MAC: A Foundation for the Trustful Space-Time Protocol." In 2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, 2016. http://dx.doi.org/10.1109/cse-euc-dcabes.2016.159.
Full textLo Iacono Ferreira, Vanesa G., and Juan Ignacio Torregrosa López. "Life Cycle Sustainability Analysis for Circular Economy." In CARPE Conference 2019: Horizon Europe and beyond. Valencia: Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10490.
Full textPorumb, Andra-Teodora, Adina Săcara-Oniţa, and Cristian Porumb. "THE DENTAL MEDICINE SECTOR IN THE AGE OF THE COVID-19 PANDEMIC – RECOVERY BETWEEN RISKS AND CHALLENGES." In Sixth International Scientific-Business Conference LIMEN Leadership, Innovation, Management and Economics: Integrated Politics of Research. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2020. http://dx.doi.org/10.31410/limen.2020.101.
Full textRajan, Vaidyanath, Badri Narayanan, Michael Barrett, and Kevin Beardsley. "Stainless Steel Pipe Welding With No Backing Gas." In ASME 2020 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/pvp2020-21799.
Full text