Sciweavers

1314 search results - page 204 / 263
» Evaluating Web Services Based Implementations of GridRPC
Sort
View
252
Voted
GIS
2009
ACM
16 years 5 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 9 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
140
Voted
JWSR
2008
147views more  JWSR 2008»
15 years 4 months ago
Karma2: Provenance Management for Data-Driven Workflows
: The increasing ability for the sciences to sense the world around us is resulting in a growing need for data driven applications that are under the control of workflows composed ...
Yogesh L. Simmhan, Beth Plale, Dennis Gannon
ACSAC
2009
IEEE
15 years 11 months ago
Analyzing Information Flow in JavaScript-Based Browser Extensions
JavaScript-based browser extensions (JSEs) enhance the core functionality of web browsers by improving their look and feel, and are widely available for commodity browsers. To ena...
Mohan Dhawan, Vinod Ganapathy
117
Voted
WWW
2003
ACM
16 years 5 months ago
Xspect: bridging open hypermedia and XLink
This paper evaluates the XLink format in comparison with other linking formats. The comparison is based on Xspect, an implementation of XLink. Xspect handles transformation betwee...
Bent Guldbjerg Christensen, Frank Allan Hansen, Ni...