Tags
grid
cluster
web service computing
service oriented architecture
web services
business service systems
cloud computing
tools and technologies for web service computing
service oriented architecture models and systems
web service
web service computing theory and models
utility
web service computing metrics and standards
utility and cloud computing models and systems
business service systems theory and models
utility and cloud computing models and systems • t
• web service computing theory and models • busine
tools and technologies
cloud computing models
bioinformatics
availability
business service domains
data mining
application systems
web service practices
deep learning
uncertainty issues
presence
the storage area
empirical studies
metrics and standards
choreography
and to the outside virtualization in the context o
empirical studies on web service computing
evaluation and quality models
theory and models
information retrieval
semantic web services
machine learning
trust
xml
semantic approaches
service composition
web service selection
web service systems
qualitative and quantitative studies and analysis
nlp
xml security
user preferences
qos
fuzzy logic
evaluation
ranking
semantic web
information extraction
big data
web services orchestration
ws-bpel 2.0
formal methods
process algebra
uncertainty issues and studies in web service prac
web and business information services and systems
communities
management
business information services
qualitative and quantitative s
simulations and developments
e-learning
computer vision
social bookmarking (sbm)
query optimisation
social bookmark spam
collective knowledge
consumer-generated media (cgm)
service level agreement (sla)
and locality • mobile clouds for new millennium
infrastructure and platforms • design tool for clo
mobile devices • social clouds (social networks in
reusability
parallel processing • virtualization on platforms
dominantrole
infrastructure and platforms ï‚· design tool for clo
parallel processing ï‚· virtualization on platforms
soa
and locality ï‚· mobile clouds for new millennium
mobile devices ï‚· social clouds (social networks in
virtual compute clusters ï‚· consolidation nosql dat
sla management and enforcement ï‚· resource provisio
governance and e-learning • virtualization • seman
corba
template
negotiation
policy attachment
policy
schema based storage
relational databases
access model
web service domain
distributed computing
interaction pattern
security
web service computing theory and models ï‚· business
sampling
jxta
design patterns
autonomic system
dynamic rule execution
genetic algorithms
unified modeling language
saudi arabia
open learning
mobile web experience
mobile web solutions
mobile solutions
enterprise mobility
mobile internet
mobile web
mobile computing
simulation
• cloud application
multimedia etc ï‚· big data tools and systems ï‚· big
privacy and trust ï‚· big data applications
models and algorithms ï‚· big data infrastructure an
traffic
round trip time
big data techniques
throughput
business rules
knowledge and semantic approaches web and business
simulations and developments of web service comput
business process
web service domain specific case studies and appli
ip
ds field
mpls
rsvp
utility and cloud computing models and systems ï‚· t
bayesian network
neural networks
xslt
xml schema
command injection
social network analysis (sna)
big data applications
quality of service (qos)
mobile web services.
word embedding model
word embedding evaluation tasks
universal concepts
& bilingual and cross-lingual word embeddings.
dynamic composition
pert
backtracking
tour planner
metrics model
km metrics
multi-dimensional model
coercive attack
sla management and enforcement • resource provisio
virtual compute clusters • consolidation nosql dat
domain specific case studies
business rules approaches.
security policies
self-adaptive
functional similarity
cloud computing paradigms
performance
metrics
web service mediation
business logic model
service integration
xpath injection
sql injection
xquery
web application security
bag-of-words
web crawling
parallel migrating web crawler
search engine
object-oriented
operational semantics.
security requirements
xml rules
relational database
xpath queries
sql
machine learning and ai for big data
cloud and grid computing for big data
parallel processing
wireless network
mobile host
smart phone
virtualization
metrics database
rating
weighted average mean(wam)
restful resources
sense disambiguation technique
homographs
evaluation and quality models of web service compu
model driven architecture
soa architecture
specific case studies
aspect-oriented programming design pattern
feature-oriented programming (fop)
aspect-oriented programming (aop)
service oriented architecture (soa)
content-based image retrieval
dense sift feature
quantization
bag-of-features
lexical semantics
composition) • emantic web inference schemes • sem
privacy
bpel
trust model.
security and intellectual property rights • inform
architectures and frameworks • web languages & web
multimedia applications using web services • feder
soap message
supply chain management
web services discovery
5g and networks for big data ï‚· big data analytics
biocatalogue
multimedia etc ï‚· big data infrastructure and platf
reinforcement learning
privacy and trust ï‚· big data techniques
models and algorithms ï‚· big data tools and systems
and recommendation system
service based application
soa framework
runtime adaptation
fuzzy system
simulations
bootstrapping
hard security
soft security
malicious
web service computing theory and models business s
predictive learning
• semantic query & search • semantic advertising a
taxonomies • collaboration and social networks • s
web 3.0 • semantic case studies • ontologies (crea
merging
linking and reconciliation) • semantic integration
dcom
rules • data integration and mash ups • unstructur
replay attack
semantic interoperability
semantic web mining • semantic web services (servi
cloud application
discovery
invocation
web service adaptation
distributed crawling
multi-core processor
distribution methodologies
soap
social web
platform specific integration architecture
semantic web service frameworks
web service description language (wsdl)
interoperability
web
it services
business services
language specific crawler
myanmar language
web portal integration architecture approaches.
similarity measure.
virtual machines
web crawler
qos attributes.
soap.
web applications
mapreduce
hadoop
re-planning
meta level
web search engine
symbolic reputation
semantic tagging
data representation
globalization
web service ecosystem
online service supply chains
classification data mining & semantic web services
graphical user interface
criminal network analysis (cna)
ada concurrent program
computability and traceability evaluation.
business logic property evaluation system
knowledge processing
software performance engineering
web service adaptation and behavioral incompatibil
business process integration
qos similarity
autonomic computing
analysis on web service
smart industry
mobile web service
utility and clo
characteristics of cloud computing
architecture of cloud computing
and parameter tampering attack.
oversized attack
xml rewriting attacks
wsdl file
platform independent integration architecture
aspect oriented programming.
security patterns
failure recovery
quantitative studies
qos factors
location affinity
recovery decisions
spatial analysis
geo-social networks
collaborative behaviour
discovery method
knowledge management systems (kms)
execution method
selection method
composition planning
service-component architecture
behavioral verification
scdl
ws-bpel
model-checker
fdr2
developments
operational semantics
domain specific case
spam
phishing
big data security
artificial intelligence
virtual compute clusters
big data analytics and social media
semantic processing & nlp
question answering (qa)
quality models
multimedia etc
api
restful
uri
graphql
stateless
http
software performance engineeri
business service systems theor
web service computing theory
internet of things
terrorist network
web objects
fusion based rank (fbr)
social networks
linked object web ranking
security and privacy for iot
soap ontology
parsing/grammatical formalisms
soap rest
android
utility and cloud computing
natural language processing
service-oriented architecture in cloud computing
mobile network
5g and networks for big data
supervised machine learning
service oriented architecture.
feature-oriented programming (
aspect-oriented programming (a
natural vs. artificial intelligence
natural logic
xml rewriting attack
cad design & testing
compression.
aspect-oriented programming de
semantics-driven language processing.
• argumentation mining and applications • big data
neural languages and nlp • information extraction
retrieval • knowledge processing • natural languag
open linked data
and ontologies • social media and web analytics •
• internet of things • security and privacy for io
databases
web portal integration archite
platform specific integration
olap and data mining
engineering
and compression
api-first approach
single page applications
algorithms and applications ï‚· bioinformatics ï‚· com
serverless architecture
distributed processing
business intelligence
ï‚· cloud application
verification
security assessment
data science
motion ui
progressive web apps
vision recognition
ai chatbots
signal & image processing
reactive distributed ai
automatic control
parameter tampering attack
similarity measure
i. consider the prototype of a user interface (ui)
semantic web service framework
web service description langua
design
algorithms
security.
other related topics
computing systems
web service practices and syst
transmitter
financial modeling
compression
big data algorithms
phonology
consistent data model
morphology
analysis on web service system
web and business service domai
signal processing
applied digital signal process
coding and transmission
knowledge based methods
machine translation
dialog systems
image formation
storage and retrieval
trust model
business service systems theory and models service
qos attributes
discovery and recommendation
models and algorithms • big data infrastructure an
processor-farm methodology
privacy and trust • big data applications
multimedia etc • big data tools and systems • big
e-mail fraud • internet security & applications •
mim
session hijacking
replay attack etc
) • ubiquitous computing security • web 2.0 securi
security and privacy for iot ï‚· iot-enabled innovat
web service computing theory a
we
probabilistic reasoning
business rules approaches
rule-based syllable segmentation.
cloud computing architecture
resource provisioning
data science and machine learn
educational data mining
schema definition language
mutation
internet
nosql data stores
consolidation
similarity measures; web service compositions; sta
utility and cloud computing models and systems too
programming languages
knowledge representation
• cluster
music search
classification data mining
data mining foundations
mobile web services
knowledge and semantic approac
ui
uml
system engineering
criminal network analysis (cna
and compression.
cryptography
schema definition language (sdl)
blockchain
mutation.
security assessment and verification.
qos similarity &user preferences
authentication
digital forensic
cryptographic protocols
uml models
ui elements
fuzzy logic/ neural networks
rmi
processor-farm methodology.
wsdl
uddi
otp.
similarity measures
web service compositions
state similarity
discovery and recommendation.
service-oriented architecture
rule-based syllable segmentation
cloud based
file systems
electronics and signal processing for iot
security techniques
parallel and distributed processing
machine learning and ai
electronics and signal process
cloud and grid computing
security requirements engineering
network and wireless network security mobile
ad hoc and sensor network security peer-to-peer ne
e-mail fraud virus
worms
trojan protection
gdp
connectivity and networking
data storage and management in cloud computing
computability
models and algorithms
big data infrastructure and platform
big data mining
big data management
big data search and mining
privacy and trust
text mining
big data tools and systems
security requirements engineering and web applicat
evaluation system
web analytics
business logic property
spoken language processing
speech recognition and synthes
nlp and machine learning
chunking/shallow parsing
behavioral incompatibility
knowledge management systems
linguistic resources
security assessment and verification
ontology
platform independent integrati
nlp and ai
data integrity
fuzzy systems
information hiding
key management
quality function deployment
quantum cryptography
secure cloud computing
security engineering
digital image processing
medical signal acquisition
information processing
image & signal processing
computer graphics
domain specific case studie
information services
music search.
web service description language (wsdl).
virtualization on platforms in the cloud
security techniques for the cloud
consolidation nosql data stores
uml 2.0
traceability evaluation
terrorist network.
cloud storage and file systems
iot-enabled innovation and entrepreneurship
service systems
See more
- Presentations
- Documents
- Infographics