Information Technology Reference
In-Depth Information
Wooldridge, M., & Jennings, N. R. (2000). The Gaia
methodology for agent-oriented analysis and design.
Journal of Autonomous Agents and Multi-Agent Systems ,
3 , 285-312. doi:10.1023/A:1010071910869
Zheng, Y., He, D., Wang, H., & Tang, X. (2005). Secure
DRM scheme for future mobile networks based on trusted
mobile platform (pp. 1164-1167). IEEE WCNM.
Zhou, J. (2005). Knowledge dichotomy and semantic
knowledge management . In 1st IFIP WG 12.5 Working
Conference on Industrial Applications of Semantic Web,
Jyväskylä, Finland.
Yao, Y., & Gehrke, J. (2002). The cougar approach to in-
network query processing in sensor networks. SIGMOD
Record , 31 (3), 9-18. doi:10.1145/601858.601861
Yau, S. S., & Liu, J. (2006). Hierarchical situation modeling
and reasoning for pervasive computing. In Proceedings
of 3rd Workshop on Software Technologies for Future
Embedded and the Second International Workshop on
Collaborative Computing, Integration, and Assurance
(SEUS-WCCIA'06) , (pp. 5-10). IEEE Computer Society.
Zhu, F., Mutka, M., & Ni, L. (2005). Facilitating secure
ad hoc service discovery in public environments. Journal
of Systems and Software , 76 (1), 45-54. doi:10.1016/j.
jss.2004.07.014
Zhu, F., Mutka, M., & Ni, L. (2006). A private, secure
and user-centric information exposure model for service
discovery protocols. IEEE Transactions on Mobile Com-
puting , 5 (4), 418-429. doi:10.1109/TMC.2006.1599409
Yusuke, M., Patrick, S., Kris, T., & Ingrid, V. (2004).
Java cryptography on KVM and its performance and
security optimization using HW/SW co-design techniques .
International Conference on Compilers, Architectures and
Synthesis of Embedded System (pp. 303-311). ACM Press.
Zhu, F., Zhu, W., Mutka, M., & Ni, L. (2007). Private
and secure service discovery via progressive and proba-
bilistic exposure. IEEE Transactions on Parallel and
Distributed Systems , 18 (11), 1565-1577. doi:10.1109/
TPDS.2007.1075
Zachman, J. A. (1987). A framework for Information Sys-
tems architecture. IBM Systems Journal , 26 (3), 276-292.
doi:10.1147/sj.263.0276
Zhu, F., Mutka, M., & Ni, L. (2003, March 23-26, 2003).
Splendor: A secure, private, and location-aware service
discovery protocol supporting mobile services. Paper
presented at the 1st IEEE Annual Conference on Pervasive
Computing and Communications, Fort Worth, Texas.
Zambonelli, F., Jennings, N. R., & Wooldredge, M. (2003).
Developing multiagent systems: The Gaia methodology.
ACM Transactions on Software Engineering and Meth-
odology , 12 (3), 317-370. doi:10.1145/958961.958963
Zdun, U., Hentrich, C., & Dustdar, S. (2007). Modeling
process-driven and service-oriented architectures using
patterns and pattern primitives. [TWEB]. ACM Transac-
tions on the Web , 1 (3), 14. doi:10.1145/1281480.1281484
Zimmermann, O., Schlimm, N., Waller, G., & Pestel,
M. (2005). Analysis and design techniques for service-
oriented development and integration. Paper presented
at the INFORMATIK 2005 - Informatik LIVE! Bonn.
Zhang, L., Zhang, J., & Cai, H. (2007). Services comput-
ing: Core enabling technology of the modern services
industry . Springer.
Zoho. (2010). CRM SaaS . Retrieved March 10, 2010,
http://www.zoho.com/
Search WWH ::




Custom Search