Gotowa bibliografia na temat „Timed business protocols”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Timed business protocols”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Timed business protocols"
MOKHTARI-ASLAOUI, KARIMA, SALIMA BENBERNOU, SOROR SAHRI, VASILIOS ANDRIKOPOULOS, FRANK LEYMANN i MOHAND-SAID HACID. "TIMED PRIVACY-AWARE BUSINESS PROTOCOLS". International Journal of Cooperative Information Systems 21, nr 02 (czerwiec 2012): 85–109. http://dx.doi.org/10.1142/s0218843012500013.
Pełny tekst źródłaElabd, Emad, Emmanuel Coquery i Mohand-Said Hacid. "From Implicit to Explicit Transitions in Business Protocols". International Journal of Web Services Research 9, nr 4 (październik 2012): 69–95. http://dx.doi.org/10.4018/jwsr.2012100104.
Pełny tekst źródłaAlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun i Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring". International Journal of Internet Technology and Secured Transactions 5, nr 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.
Pełny tekst źródłaBiornstad, Biorn, Cesare Pautasso i Gustavo Alonso. "Enforcing web services business protocols at run-time: a process-driven approach". International Journal of Web Engineering and Technology 2, nr 4 (2006): 396. http://dx.doi.org/10.1504/ijwet.2006.010422.
Pełny tekst źródłaRao, N. H. "Electronic Commerce and Opportunities for Agribusiness in India". Outlook on Agriculture 32, nr 1 (marzec 2003): 29–33. http://dx.doi.org/10.5367/000000003101294235.
Pełny tekst źródłaUBERMORGEN, /. "Everything is always (the liquid protocol)". Finance and Society 2, nr 2 (19.12.2016): 175–79. http://dx.doi.org/10.2218/finsoc.v2i2.1731.
Pełny tekst źródłaSayeed, Sarwar, i Hector Marco-Gisbert. "Proof of Adjourn (PoAj): A Novel Approach to Mitigate Blockchain Attacks". Applied Sciences 10, nr 18 (22.09.2020): 6607. http://dx.doi.org/10.3390/app10186607.
Pełny tekst źródłaHerschel, Richard T., i Nicolle Clements. "The Importance of Storytelling in Business Intelligence". International Journal of Business Intelligence Research 8, nr 1 (styczeń 2017): 26–39. http://dx.doi.org/10.4018/ijbir.2017010102.
Pełny tekst źródłaRigin, Anton Mikhailovich, i Sergey Andreevich Shershakov. "Method of Performance Analysis of Time-Critical Applications Using DB-Nets". Proceedings of the Institute for System Programming of the RAS 33, nr 3 (2021): 109–22. http://dx.doi.org/10.15514/ispras-2021-33(3)-9.
Pełny tekst źródłaJain, Tarun, i Bijendra Nath Jain. "Infection Testing at Scale: An Examination of Pooled Testing Diagnostics". Vikalpa: The Journal for Decision Makers 46, nr 1 (marzec 2021): 13–26. http://dx.doi.org/10.1177/02560909211018906.
Pełny tekst źródłaRozprawy doktorskie na temat "Timed business protocols"
Ponge, Julien Nicolas Computer Science & Engineering Faculty of Engineering UNSW. "Model based analysis of time-aware web services interactions". Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43525.
Pełny tekst źródłaElabd, Emad. "Compliance of Web services over a high level specification". Thesis, Lyon 1, 2011. http://www.theses.fr/2011LYO10122/document.
Pełny tekst źródłaCurrently, Web services technology is rapidly move forward supported by major players in the field of information systems. Web services applications are loosely coupled and usable in an automatic way via the use of a set of standards based on XML. Beside the syntactic description of messages, there is a need for the semantic description of the behavior of services. Indeed, whether in the design of a service or composition of services, it is important to check compliance with a set of specifications. Enriching services descriptions by including their behaviors is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of message exchanges. Web services use access control policies (ACP) to restrict the access to authorized consumer. These policies should be a part of the service description. In this thesis, the interoperability analysis in terms of AC after the formalization of the Web services annotated with the access control (AC) is performed. In addition, we present an approach for embedding the checking tools in the AC enforcement architecture to guarantee the errors free interaction. The ACP and the credentials are presented as ontology in order to benefit from the flexibility offered by subsumption on concepts. Web services choreography is used in the design phase of complex peer-to-peer applications in which each peer can be implemented by a Web service. Therefore, selecting Web services for choreography implementation using the compatibility checking approach with access control is one of the objectives of our research. In this work, the business protocol models of the Web service are extended by adding information to the message on each transition about the service in which this message will sent to or received from. We define and verify Web service compatibility in order to see if (and how) several services can have interactions based on their protocols. This approach will help the designers to select Web services in an easy way and verify if they can implement the required choreography or not by checking the compatibly using our approach
Książki na temat "Timed business protocols"
Ovodenko, Alexander. Producers, Trade Groups, and the Design of Global Environmental Regimes. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190677725.003.0006.
Pełny tekst źródłaCalloway, Colin G. Treaties and Treaty Making. Redaktor Frederick E. Hoxie. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199858897.013.34.
Pełny tekst źródłaCzęści książek na temat "Timed business protocols"
Copei, Sebastian, Manuel Wickert i Albert Zündorf. "Certification as a Service". W Agile Processes in Software Engineering and Extreme Programming – Workshops, 203–10. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58858-8_21.
Pełny tekst źródłaEngel, Markus, Christopher Kramer, Tobias Braun, Dennis Christmann i Reinhard Gotzhein. "BiPS – A Real-Time-Capable Protocol Framework for Wireless Networked Control Systems and Its Application". W E-Business and Telecommunications, 313–36. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11039-0_15.
Pełny tekst źródłaNorville, Richard S., Kamesh Namuduri i Ravi Pendse. "Node Authentication in Networks Using Zero-Knowledge Proofs". W Web Services Security and E-Business, 142–64. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-168-1.ch008.
Pełny tekst źródłaRabadi, Yousef E., i Joan Lu. "Building a Secured XML Real-Time Interactive Data Exchange Architecture". W Ontologies and Big Data Considerations for Effective Intelligence, 327–412. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2058-0.ch008.
Pełny tekst źródłaRabadi, Yousef E., i Joan Lu. "Building a Secured XML Real-Time Interactive Data Exchange Architecture". W Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 270–357. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch013.
Pełny tekst źródłaVukovic, Maja, i Claudio Bartolini. "Towards Crowd-Driven Business Processes". W Handbook of Research on E-Business Standards and Protocols, 412–29. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0146-8.ch019.
Pełny tekst źródłaPoon, Simpson. "Future of Small Business E-Commerce". W Encyclopedia of Information Science and Technology, First Edition, 1253–56. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch221.
Pełny tekst źródłaLee, Byung Kwan, Seung Hae Yang i Tai-Chi Lee. "A SEEP Protocol Design Using 3BC, ECC(F2m) and HECC Algorithm". W Business Data Communications and Networking, 328–45. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-274-9.ch013.
Pełny tekst źródłaVuković, Maja, i Claudio Bartolini. "Towards Crowd-Driven Business Processes". W Crowdsourcing, 173–92. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8362-2.ch009.
Pełny tekst źródłaLin, Koong, Chad Lin i Huei Leu. "Decision Analysis for Business to Adopt RFID". W Ubiquitous and Pervasive Computing, 1219–27. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch076.
Pełny tekst źródłaStreszczenia konferencji na temat "Timed business protocols"
Mokhtari, Karima, Salima Benbernou, Mohsen Rouached, Frank Leyman i Mohand-Said Hacid. "Privacy Time-Related Analysis in Business Protocols". W 2009 IEEE International Conference on Web Services (ICWS). IEEE, 2009. http://dx.doi.org/10.1109/icws.2009.87.
Pełny tekst źródłaXiang, Mantian, Lihua Sun i Lihong Li. "Time-diffusion synchronization protocols in wireless sensor networks". W 2011 International Conference on E-Business and E-Government (ICEE). IEEE, 2011. http://dx.doi.org/10.1109/icebeg.2011.5882272.
Pełny tekst źródła"TOWARDS RUN-TIME PROTOCOL ANOMALY DETECTION AND VERIFICATION". W 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001395802990304.
Pełny tekst źródłaAlexieva, Sonya. "COMMUNICATIONS IN TOURISM IN TIMES OF PANDEMIC: FROM CONVENTIONAL TO DIGITAL CONNECTIVITY". W TOURISM AND CONNECTIVITY 2020. University publishing house "Science and Economics", University of Economics - Varna, 2020. http://dx.doi.org/10.36997/tc2020.655.
Pełny tekst źródłaMekid, Samir, i Usman Akbar. "Configuration and Business Protocol of International Load Sharing of Manufacturing and its Challenges Under I4.0 and IIoT". W ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10158.
Pełny tekst źródłaMa, Haiying, i Ning Cai. "Swarm Stability of Compartmental Networks with Linear Time-Invariant High-Order Dynamical Protocol". W 2011 International Conference on Business Computing and Global Informatization (BCGIn). IEEE, 2011. http://dx.doi.org/10.1109/bcgin.2011.138.
Pełny tekst źródłaResner, Davi, i Antonio Augusto Frohlich. "TSTP MAC: A Foundation for the Trustful Space-Time Protocol". W 2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, 2016. http://dx.doi.org/10.1109/cse-euc-dcabes.2016.159.
Pełny tekst źródłaLo Iacono Ferreira, Vanesa G., i Juan Ignacio Torregrosa López. "Life Cycle Sustainability Analysis for Circular Economy". W CARPE Conference 2019: Horizon Europe and beyond. Valencia: Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10490.
Pełny tekst źródłaPorumb, Andra-Teodora, Adina Săcara-Oniţa i Cristian Porumb. "THE DENTAL MEDICINE SECTOR IN THE AGE OF THE COVID-19 PANDEMIC – RECOVERY BETWEEN RISKS AND CHALLENGES". W Sixth International Scientific-Business Conference LIMEN Leadership, Innovation, Management and Economics: Integrated Politics of Research. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2020. http://dx.doi.org/10.31410/limen.2020.101.
Pełny tekst źródłaRajan, Vaidyanath, Badri Narayanan, Michael Barrett i Kevin Beardsley. "Stainless Steel Pipe Welding With No Backing Gas". W ASME 2020 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/pvp2020-21799.
Pełny tekst źródła