Sciweavers

975 search results - page 118 / 195
» A hotel information system implementation using MAS technolo...
Sort
View
WWW
2008
ACM
16 years 4 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
SIGUCCS
2000
ACM
15 years 7 months ago
From VTs to iMacs: Moving Public Computing Access into the 21st Century
In a Collegiate setting, technology must be functional, effective, and highly visible. In the fall of 1999 the CIS department at Bowdoin College saw the need for a greater number ...
Robert Denton, Patrick Jensen
BERTINORO
2005
Springer
15 years 9 months ago
Power-Aware Distributed Protocol for a Connectivity Problem in Wireless Sensor Networks
We consider the problem of assigning transmission powers to the nodes of a wireless network in such a way that all the nodes are connected by bidirectional links and the total powe...
Roberto Montemanni, Luca Maria Gambardella
ISAS
2005
Springer
15 years 9 months ago
Contract-Based Web Service Composition Framework with Correctness Guarantees
Abstract. We present formal and practical foundations for Web service composition framework with composition correctness guarantees. We introduce contractual composition model base...
Nikola Milanovic
138
Voted
SPIRE
2005
Springer
15 years 9 months ago
XML Retrieval with a Natural Language Interface
Effective information retrieval in XML documents requires the user to have good knowledge of document structure and of some formal query language. XML query languages like XPath a...
Xavier Tannier, Shlomo Geva