default search action
ACM Transactions on Internet Technology (TOIT), Volume 8
Volume 8, Number 1, November 2007
- Brahim Medjahed, Athman Bouguettaya, Boualem Benatallah:
Introduction to special issue on semantic Web services. 1 - Eran Toch, Avigdor Gal, Iris Reinhartz-Berger, Dov Dori:
A semantic approach to approximate service retrieval. 2 - Marco Brambilla, Stefano Ceri, Federico Michele Facca, Irene Celino, Dario Cerizza, Emanuele Della Valle:
Model-driven design and development of semantic Web service applications. 3 - Michael Mrissa, Chirine Ghedira, Djamal Benslimane, Zakaria Maamar, Florian Rosenberg, Schahram Dustdar:
A context-based mediation approach to compose semantic Web services. 4 - Mohamed Shehab, Kamal Bhattacharya, Arif Ghafoor:
Web services discovery in secure collaboration environments. 5
Volume 8, Number 2, February 2008
- Qing Li, Rynson W. H. Lau, Timothy K. Shih, Dennis McLeod:
Introduction to special issue internet technologies for distance education. 1:1-1:2 - Xuping Tu, Hai Jin, Xiaofei Liao, Jiannong Cao:
Nearcast: A locality-aware P2P live streaming approach for distance education. 2:1-2:23 - Peter Dolog, Bernd Simon, Wolfgang Nejdl, Tomaz Klobucar:
Personalizing access to learning networks. 3:1-3:21 - Paola Salomoni, Silvia Mirri, Stefano Ferretti, Marco Roccetti:
A multimedia broker to support accessible and mobile learning through learning objects adaptation. 4:1-4:23 - Qing Li, Rynson W. H. Lau, Timothy K. Shih, Frederick W. B. Li:
Technology supports for distributed and collaborative learning over the internet. 5:1-5:24
Volume 8, Number 3, May 2008
- Qusay H. Mahmoud, Peter Langendörfer:
Guest editorial: Service-oriented computing. 11:1-11:3 - Robert A. van Engelen:
A framework for service-oriented computing with C and C++ Web service components. 12:1-12:25 - Wil M. P. van der Aalst, Marlon Dumas, Chun Ouyang, Anne Rozinat, Eric Verbeek:
Conformance checking of service behavior. 13:1-13:30 - Jingwen Jin, Klara Nahrstedt:
QoS-Aware service management for component-based distributed applications. 14:1-14:31 - Uwe Zdun:
Pattern-based design of a service-oriented middleware for remote object federations. 15:1-15:38
Volume 8, Number 4, September 2008
- Amir Herzberg, Ahmad Jbara:
Security and identification indicators for browsers against spoofing and phishing attacks. 16:1-16:36 - Manish Gupta, Shamik Banerjee, Manish Agrawal, H. Raghav Rao:
Security analysis of Internet technology components enabling globally distributed workplaces - a framework. 17:1-17:38 - Jeannie R. Albrecht, David L. Oppenheimer, Amin Vahdat, David A. Patterson:
Design and implementation trade-offs for wide-area resource discovery. 18:1-18:44 - Antonio Brogi, Sara Corfini, Razvan Popescu:
Semantics-based composition-oriented discovery of Web services. 19:1-19:39 - Hai Zhuge, Yunpeng Xing, Peng Shi:
Resource space model, OWL and database: Mapping and integration. 20:1-20:31 - Xiao-Bing Xue, Zhi-Hua Zhou, Zhongfei (Mark) Zhang:
Improving Web search using image snippets. 21:1-21:28
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.