Search

Your search keyword '"Service Oriented Computing ( SOC )"' showing total 550 results

Search Constraints

Start Over You searched for: Author "Service Oriented Computing ( SOC )" Remove constraint Author: "Service Oriented Computing ( SOC )"
550 results on '"Service Oriented Computing ( SOC )"'

Search Results

1. A goal-based approach to engineering capacity-driven Web services

2. Software development methodology in a Green IT environment

3. Cloud big data application for transport

4. A Credibility and Classification-Based Approach for Opinion Analysis in Social Networks

5. Context-Aware Service Recommendation Based on Knowledge Graph Embedding

6. A Resource-Oriented Architecture for Integration and Exploitation of Linked Data

7. Data Services with uncertain and correlated semantics

8. Une approche de filtrage d'opinions à base de crédibilité dans un contexte de réseaux sociaux

9. Web services composition in uncertain environments

10. Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud/Fog Computing

11. PAIRSE: A Privacy-Preserving Service-Oriented Data Integration System

12. A platform for Web service adaptation and substitution

13. Context-based Semantic Similarity across ontologies

14. Blockchain smart contracts: Applications, challenges, and future trends

15. Call Limit-Based Composite Service Selection

16. Applying integrated Blockchain and Big Data technologies to improve supply chain traceability and information sharing in the textile sector

17. Integration of ontologies to support Control as a Service in an Industry 4.0 context

18. A microservice-based framework for exploring data selection in cross-building knowledge transfer

19. A new predictive medical approach based on data mining and Symbiotic Organisms Search algorithm

20. Cloud computing security taxonomy: From an atomistic to a holistic view

21. Time-centric and resource-driven composition for the Internet of Things

22. Semantic thingsourcing for the Internet of Things

23. A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT

24. Agile and Dynamic Virtualized Network Functions Wiring in Network Services

25. QoS-based Trust Evaluation for Data Services as a Black Box

26. Towards an adaptive curation services composition based on machine learning

27. The European CHAISE Initiative to Shape the Future of Blockchain Skill Qualification and Certification

28. A Semantic virtualized network functions description and discovery model

29. Data Management in the Data Lake: A Systematic Mapping

30. Decentralized Collaborative Business Process Execution Using Blockchain

31. Towards a cell-inspired approach for a sustainable internet-of-things

32. Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction

33. Future generation of service-oriented computing systems

34. Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption

35. Modelling of Decentralised Blockchain Applications Development

36. A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy

37. Symbiotic Organisms Search algorithm- based data mining for predictive Heart disease Medical Assistance

38. Data centered Usage based Protection in a SMACIT context

39. A Multi-Model based Microservices Identification Approach

40. Selecting Services for Multiple Users: Let’s Be Democratic

41. Data centered and Usage-based Security service

42. Top- k query optimization over data services

43. Data Provenance for Complex Event Processing Invoking Composition of Services

44. Process-of-Things: Weaving film industry’s practices into the Internet-of-Things

45. Time-aware selection approach for service composition based on pruning and improvement techniques

46. Towards an Automatic Identification of Microservices from Business Processes

47. Towards Control as a Service models and architecture for the Industry 4.0

48. Modèles et architecture « Control as a Service » pour l’Industrie 4.0

49. Smart and safe self‐adaption of connected devices based on discrete controllers

50. A Data-centered Usage Governance: Providing Life-long Protection to Data Exchanged in Virtual Enterprises

Catalog

Books, media, physical & digital resources