Author of the publication

A B2B formal conversation language based on Semantic Web Services.

, , and . SDWP@ICWS, volume 140 of CEUR Workshop Proceedings, CEUR-WS.org, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MEDFINDER - Using Semantic Web, Web 2.0 and Geolocation Methods to Develop a Decision Support System to Locate Doctors, , , , , , , and . Proceedings of WEBIST, page 288-293. (2009)Combining Semantic Web technologies with Multi-Agent Systems for integrated access to biological resources, , , , and . Journal of Biomedical Informatics (JBI), 41 (5): 848-859 (2008)A Multi-agent System for Traffic Control for Emergencies by Quadrants, , , , , , , , and . Proceedings of International Conference on Internet and Web Applications and Services (ICIW), page 247-253. (2009)A Portlet-Based Service-Oriented Architecture for a second generation portal., , , and . JIISIC, page 363-370. Área de Ingeniería de Software VLIR-ESPOL Componente 8, Facultad de Ingeniería Eléctrica y Computación, Escuela Superior Politécnica del Litoral, (2008)An Approach for Web Accreditation Services., , , and . SWWS, page 333-335. CSREA Press, (2008)Identity Authentication Services., , , and . Security and Management, page 655-659. CSREA Press, (2008)A Multi-criteria Service Ranking Approach Based on Non-Functional Properties Rules Evaluation., , , , and . ICSOC, volume 4749 of Lecture Notes in Computer Science, page 435-441. Springer, (2007)GODO: Goal driven orchestration for Semantic Web Services., , , and . WIW, volume 113 of CEUR Workshop Proceedings, CEUR-WS.org, (2004)Enabling role-based web access control using a declarative logical framework., , , and . ICDE Workshops, page 470-474. IEEE Computer Society, (2008)Capturing Semantics for Information Security and Privacy Assurance., , , and . UIC, volume 5061 of Lecture Notes in Computer Science, page 105-118. Springer, (2008)