Sciweavers

517 search results - page 56 / 104
» Approaches to P2P Internet Application Development
Sort
View
TEC
2002
166views more  TEC 2002»
15 years 3 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
133
Voted
APWEB
2006
Springer
15 years 7 months ago
Named Graphs as a Mechanism for Reasoning About Provenance
Named Graphs is a simple, compatible extension to the RDF syntax that enables statements to be made about RDF graphs. This approach is in contrast to earlier attempts such as RDF r...
E. Rowland Watkins, Denis A. Nicole
WWW
2004
ACM
16 years 4 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
WWW
2008
ACM
16 years 4 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
ICWS
2003
IEEE
15 years 5 months ago
A Web Service Approach to Universal Accessibility in Collaboration Services
The enormous growth in wireless communications and miniaturized handheld devices in the last few years, have given rise to a vast range of new services, for heterogeneous user env...
Sangmi Lee, Sung Hoon Ko, Geoffrey Fox, Kang-Seok ...