Sciweavers

3638 search results - page 668 / 728
» Distribution chain security
Sort
View
ICCSA
2005
Springer
14 years 2 months ago
Resource and Service Discovery in the iGrid Information Service
In this paper we describe resource and service discovery mechanisms available in iGrid, a novel Grid Information Service based on the relational model. iGrid is developed within th...
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, S...
ICIAR
2005
Springer
14 years 2 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
OOPSLA
2005
Springer
14 years 2 months ago
Io: a small programming language
Io is small prototype-based programming language. The ideas in Io are mostly inspired by Smalltalk[1] (all values are objects), Self[2] (prototype-based), NewtonScript[3] (differe...
Steve Dekorte
OOPSLA
2005
Springer
14 years 2 months ago
Using refactorings to automatically update component-based applications
Frameworks and libraries change their APIs during evolution. Migrating an application to the new API is tedious and disrupts the development process. Although some tools and techn...
Danny Dig
SPC
2005
Springer
14 years 2 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...