Sciweavers

5324 search results - page 825 / 1065
» Internet Security Protocols
Sort
View
ESOP
2007
Springer
14 years 4 months ago
Probabilistic Anonymity Via Coalgebraic Simulations
There is a growing concern on anonymity and privacy on the Internet, resulting in lots of work on formalization and verification of anonymity. Especially, importance of probabilis...
Ichiro Hasuo, Yoshinobu Kawabe
SEMWEB
2007
Springer
14 years 4 months ago
RDFSync: Efficient Remote Synchronization of RDF Models
In this paper we describe RDFSync, a methodology for efficient synchronization and merging of RDF models. RDFSync is based on decomposing a model into Minimum Self-Contained graphs...
Giovanni Tummarello, Christian Morbidoni, Reto Bac...
DSRT
2006
IEEE
14 years 4 months ago
Design of Distributed Collaborative Application through Service Aggregation
The pace of technological change requires applications to constantly evolve. Service Oriented Architecture (SOA) promises to render this evolution more flexible. We present a cas...
Andrew Roczniak, Jamil Melhem, Pierre Lévy,...
WETICE
2006
IEEE
14 years 4 months ago
Exploiting the TTL Rule in Unstructured Peer-to-Peer Networks
Peer-to-Peer networks exist with the volunteering cooperation of various entities on the Internet. Their self-structure nature has the important characteristic that they make no u...
Georgios Pitsilis, Panayiotis Periorellis
ISSRE
2005
IEEE
14 years 4 months ago
Testing Web Services by XML Perturbation
The eXtensible Markup Language (XML) is widely used to transmit data across the Internet. XML schemas are used to define the syntax of XML messages. XML-based applications can re...
Wuzhi Xu, Jeff Offutt, Juan Luo