The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A composite service can be built from Web Services. Some of the composite services require transactional properties to ensure their successful execution. Since different composite services might access the same Web Services concurrently, controlling the access to these shared services is an important issue. This paper proposes a static analysis technique for helping concurrency control mechanisms...
A composite service can be built from Web Services, and, its workflow can be specified using BPEL4WS. Many composite services are long-running transactional processes. This paper proposes a concurrency control scheme for executing transactional composite services. The scheme uses the information gathered from the workflow specifications of the composite services to guarantee the correctness of the...
Mobile IP and SIP give solutions to wireless applications to maintain the connectivity while handover is occurred. However, many existing services need further modification in order to perform advanced mobile behaviours. This study presents a software agent, which performs the undercover maintenance of connectivity at the application layer for handling the mobility in all-IP networks. It gives an...
Mobile agent technology is going to play an important role in the future electronic commerce due to the characteristics of mobility and autonomy of the agents. Therefore, security issues should be solved before we use this new technology. However, privacy protection of customers is seldom considered. In this paper, we focus on the privacy protection of customers. Moreover, we improve our scheme more...
Interlayer interaction of a layered error-recovery mechanism to act against channel errors for wireless-data communications is examined in this paper. Error-control designs are implemented at two different layers in the protocol stack. A finite number of retransmissions is performed at the lower layer by a mix-mode automatic-repeat request as the primary error removal. At the upper layer, a time-out...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.