Sciweavers

1314 search results - page 198 / 263
» Evaluating Web Services Based Implementations of GridRPC
Sort
View
DIMVA
2009
15 years 5 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
SACMAT
2011
ACM
14 years 7 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
IC
2003
15 years 6 months ago
Concept Based Query Enhancement in the ARCH Search Agent
The quality of the search experience has been an enduring problem for the World Wide Web. One of the well-known difficulties is the tendency of users to use short, under-specified...
Ahu Sieg, Bamshad Mobasher, Steven L. Lytinen, Rob...
SIGMOD
1998
ACM
180views Database» more  SIGMOD 1998»
15 years 9 months ago
Integration of Heterogeneous Databases Without Common Domains Using Queries Based on Textual Similarity
Most databases contain ā€œname constantsā€ like course numbers, personal names, and place names that correspond to entities in the real world. Previous work in integration of het...
William W. Cohen
ICC
2007
IEEE
199views Communications» more  ICC 2007»
15 years 11 months ago
7DS - Node Cooperation and Information Exchange in Mostly Disconnected Networks
— When the node density in a network decreases below the level necessary to sustain ad-hoc and mesh networks, communication can succeed only by leveraging node mobility and trans...
Suman Srinivasan, Arezu Moghadam, Se Gi Hong, Henn...