Sciweavers

3086 search results - page 419 / 618
» Developing Secure Web Applications
Sort
View
130
Voted
IWRT
2008
109views Communications» more  IWRT 2008»
15 years 3 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
SIES
2007
IEEE
15 years 8 months ago
Architecture and Implementation of an Embedded Wormhole
Abstract— Recent advances in wireless communication technology have opened the way for mobile services and applications. This paper describes ongoing work in the context of the H...
Hugo Ortiz, Antonio Casimiro, Paulo Veríssi...
CSCW
2011
ACM
14 years 5 months ago
Real-time groupware in the browser: testing the performance of web-based networking
Standard web browsers are becoming a common platform for delivering groupware applications, but until recently, the only way to support real-time collaboration was with browser pl...
Carl A. Gutwin, Michael Lippold, T. C. Nicholas Gr...
136
Voted
IPPS
2002
IEEE
15 years 7 months ago
FARM: A Feedback-Based Adaptive Resource Management for Autonomous Hot-Spot Convergence System
Abstract— In this paper, we present a novel and comprehensive resource management solution for the autonomous hot-spot convergence system (AHSCS) that uses sensor web. This solut...
S. Swaminathan, G. Manimaran
APSCC
2010
IEEE
14 years 9 months ago
ValySeC: A Variability Analysis Tool for Service Compositions Using VxBPEL
Nowadays applications are increasingly developed based on remote Web services and service composition has become a powerful novel development paradigm. Due to the fact that such a...
Chang-ai Sun, Tieheng Xue, Marco Aiello