Sciweavers

2478 search results - page 70 / 496
» Message from the Chair
Sort
View
USENIX
2003
15 years 5 months ago
ASK: Active Spam Killer
We present Active Spam Killer (ASK), a program that attempts to validate unknown senders before allowing delivery of their message. Validation occurs by means of a challenge reply...
Marco Paganini
IFIP
1998
Springer
15 years 8 months ago
On the architecture of software component systems
Current object-oriented development practice is centered around application frameworks. In this paper, we argue that this approach is misleading, as it distracts from the ultimate...
M. Franz
INTERNET
2010
119views more  INTERNET 2010»
15 years 2 months ago
A Chat Application in Lift
s the HTTP request–response cycle rather than wrapping HTTP concepts in APIs. This means you put HTML element definition and action in the same place: var name = "" SHt...
David Pollak, Steve Vinoski
IEEESCC
2007
IEEE
15 years 10 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...
CIS
2004
Springer
15 years 9 months ago
General Public Key m-Out-of-n Oblivious Transfer
Abstract. In the m-out-of-n oblivious transfer model, Alice has n messages, Bob has m choices. After the interaction between the two parties, Bob can get m but only m messages from...
Zhide Chen, Hong Zhu