Sciweavers

3086 search results - page 399 / 618
» Developing Secure Web Applications
Sort
View
126
Voted
ISI
2008
Springer
15 years 2 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
15 years 2 months ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
139
Voted
COMPSAC
1999
IEEE
15 years 6 months ago
Testing Extensible Design Patterns in Object-Oriented Frameworks through Scenario Templates
Design patterns have been used in object-oriented frameworks such as the IBM San Francisco framework, Apple's Rhaspody, OpenStep, and WebObjects, and DIWB. However, few guide...
Wei-Tek Tsai, Yongzhong Tu, Weiguang Shao, Ezra Eb...
ER
2007
Springer
117views Database» more  ER 2007»
15 years 8 months ago
Conceptual Modeling for Virtual Reality
This paper explores the opportunities and challenges for Conceptual Modeling in the domain of Virtual Reality (VR). VR applications are becoming more feasible due to better and fa...
Olga De Troyer, Frederic Kleinermann, Bram Pellens...
SIGSOFT
2010
ACM
15 years 11 days ago
Software for everyone by everyone
Given the dizzying pace of change in computer science, trying to look too far into the future of software engineering is hard. However, it might be possible to predict the future ...
Tevfik Bultan