Sciweavers

3024 search results - page 525 / 605
» Requirement Engineering in Service-Oriented System Engineeri...
Sort
View
MOBICOM
2006
ACM
15 years 10 months ago
Localization in underwater sensor networks: survey and challenges
In underwater sensor networks (UWSNs), determining the location of every sensor is important and the process of estimating the location of each node in a sensor network is known a...
Vijay R. Chandrasekhar, Winston Khoon Guan Seah, Y...
SAC
2006
ACM
15 years 10 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
DASFAA
2005
IEEE
112views Database» more  DASFAA 2005»
15 years 10 months ago
Xandy: Detecting Changes on Large Unordered XML Documents Using Relational Databases
Previous works in change detection on XML documents are not suitable for detecting the changes to large XML documents as it requires a lot of memory to keep the two versions of XML...
Erwin Leonardi, Sourav S. Bhowmick, Sanjay Kumar M...
ISCC
2005
IEEE
15 years 10 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
MM
2005
ACM
179views Multimedia» more  MM 2005»
15 years 10 months ago
rStream: resilient peer-to-peer streaming with rateless codes
The inherent instability and unreliability of peer-to-peer networks introduce several fundamental engineering challenges to multimedia streaming over peer-to-peer networks. First,...
Chuan Wu, Baochun Li