Sciweavers

2043 search results - page 401 / 409
» Reasoning About Security Models
Sort
View
ECIS
2000
13 years 11 months ago
The Learning Administration - Shaping Change and Taking Off into the Future
- E-services will change the future of business as well as private relationships. The rearrangement of value chains, new competitive arenas and the growing necessity and interest i...
Hans-Jörg Bullinger, Werner Brettreich-Teichm...
USS
2010
13 years 7 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
GIS
2008
ACM
14 years 11 months ago
GEDMWA: geospatial exploratory data mining web agent
An abundance of geospatial information is flourishing on the Internet but mining and disseminating these data is a daunting task. With anything published on the web available to t...
Edward Pultar, Martin Raubal, Michael F. Goodchild
GIS
2005
ACM
14 years 11 months ago
In-network surface simplification for sensor fields
Recent research literature on sensor network databases has focused on finding ways to perform in-network aggregation of sensor readings to reduce the message cost. However, with t...
Brian Harrington, Yan Huang
GIS
2005
ACM
14 years 11 months ago
Supporting uncertainty in moving objects in network databases
The management of moving objects has been intensively studied in the recent years. A wide and increasing range of database applications has to deal with spatial objects whose posi...
Ralf Hartmut Güting, Victor Teixeira de Almei...