Sciweavers

5088 search results - page 110 / 1018
» Rich Internet Applications
Sort
View
AH
2000
Springer
15 years 8 months ago
Layered Evaluation of Adaptive Applications and Services
In this paper we present an empirical study of the InterBook system to demonstrate the benefits of the layered evaluation framework, where the success of adaptation is addressed at...
Charalampos Karagiannidis, Demetrios G. Sampson
ECWEB
2000
Springer
103views ECommerce» more  ECWEB 2000»
15 years 8 months ago
Security of Electronic Business Applications - Structure and Quantification
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Konstantin Knorr, Susanne Röhrig
WWW
2011
ACM
14 years 11 months ago
Citizen sensor data mining, social media analytics and development centric web applications
With the rapid rise in the popularity of social media (500M+ Facebook users, 100M+ twitter users), and near ubiquitous mobile access (4.1 billion actively-used mobile phones), the...
Meenakshi Nagarajan, Amit P. Sheth, Selvam Velmuru...
ACSAC
2001
IEEE
15 years 8 months ago
Application Intrusion Detection using Language Library Calls
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Anita K. Jones, Yu Lin
JSAC
2010
135views more  JSAC 2010»
15 years 2 months ago
Provisioning mission-critical telerobotic control systems over internet backbone networks with essentially-perfect QoS
—Over the next decades, the Internet will evolve to support increasingly complex mission-critical services such as telerobotically controlled surgery. The world’s first telero...
T. H. Szymanski, D. Gilbert