Sciweavers

1880 search results - page 322 / 376
» Mobile Application Profiling for Connected Mobile Devices
Sort
View
ICALP
2005
Springer
15 years 10 months ago
Basic Observables for a Calculus for Global Computing
We introduce a foundational language for modelling applications over global computers whose interconnection structure can be explicitly manipulated. Together with process distribut...
Rocco De Nicola, Daniele Gorla, Rosario Pugliese
131
Voted
NSPW
2004
ACM
15 years 10 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
145
Voted
COOPIS
2000
IEEE
15 years 9 months ago
An Evaluation of the Java-Based Approaches to Web Database Access
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information system...
Stavros Papastavrou, Panos K. Chrysanthis, George ...
IJNSEC
2008
108views more  IJNSEC 2008»
15 years 4 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
158
Voted
DEBU
2002
144views more  DEBU 2002»
15 years 4 months ago
Definition and Execution of Composite Web Services: The SELF-SERV Project
Web services composition is emerging as a promising technology for the effective automation of businessto-business collaborations. It allows organizations to form alliances by con...
Boualem Benatallah, Marlon Dumas, Zakaria Maamar