Sciweavers

8982 search results - page 196 / 1797
» Applications of Aglet Technology
Sort
View
137
Voted
CCECE
2006
IEEE
15 years 9 months ago
Security Issues in VOIP Applications
Recent Voice over Internet Protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems involve se...
Patrick C. K. Hung, Miguel Vargas Martin
138
Voted
WETICE
2006
IEEE
15 years 9 months ago
Handling Exceptional Conditions in Mobile Collaborative Applications: An Exploratory Case Study
The incorporation of exception handling strategies in mobile collaborative applications bring several challenges to middleware designers due to their intrinsic characteristics of ...
Nélio Cacho, Karla Damasceno, Alessandro Ga...
151
Voted
ICWE
2005
Springer
15 years 9 months ago
An Investigation of Cloning in Web Applications
Cloning (ad hoc reuse by duplication of design or code) speeds up development, but also hinders future maintenance. Cloning also hints at reuse opportunities that, if exploited sys...
Damith C. Rajapakse, Stan Jarzabek
151
Voted
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 8 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
120
Voted
DOCENG
2008
ACM
15 years 5 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer