Sciweavers

979 search results - page 107 / 196
» Presentations for Abstract Context Institutions
Sort
View
AMAST
2004
Springer
14 years 1 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns
AOSE
2004
Springer
14 years 1 months ago
An Agent Construction Model for Ubiquitous Computing Devices
Abstract. One of the main challenges for the successful application of agentbased systems in mobile and embedded devices is enabling application developers to reconcile the needs o...
Ronald Ashri, Michael Luck
ERCIMDL
2004
Springer
104views Education» more  ERCIMDL 2004»
14 years 1 months ago
Servicing the Federation: The Case for Metadata Harvesting
The paper presents a comparative analysis of data harvesting and distributed computing as complementary models of service delivery within large-scale federated digital libraries. I...
Fabio Simeoni
ESORICS
2004
Springer
14 years 1 months ago
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
Abstract. The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first propos...
Rainer Böhme, Andreas Westfeld
EURONGI
2004
Springer
14 years 1 months ago
Enabling Mobile Peer-to-Peer Networking
Abstract. In this paper we present a P2P file-sharing architecture optimized for mobile networks. We discuss the applicability of current P2P techniques for resource access and me...
Jens O. Oberender, Frank-Uwe Andersen, Hermann de ...