Sciweavers

301 search results - page 54 / 61
» Secure scripting based composite application development: Fr...
Sort
View
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 1 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
ICDCIT
2005
Springer
14 years 1 months ago
Off-Line Micro-payment System for Content Sharing in P2P Networks
— Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-asyou-use services for a wide variety of web-based applications. We proposed a n...
Xiaoling Dai, John C. Grundy
CSI
2007
86views more  CSI 2007»
13 years 7 months ago
Using UML to model relational database operations
The Unified Modeling Language (UML) is being used as the de-facto standard in the software industry. With the adoption of UML 2.0, the new enhancements allow this version to desc...
Eunjee Song, Shuxin Yin, Indrakshi Ray
LCN
2000
IEEE
13 years 11 months ago
Efficient Congestion Avoidance Mechanism
The nowadays Internet architecture is mainly based on unicast communications and best-effort service. However, the development of the Internet encouraged emerging services that ar...
Anca Dracinschi Sailer, Serge Fdida
EAGC
2003
Springer
14 years 24 days ago
Automatic Services Discovery, Monitoring and Visualization of Grid Environments: The MapCenter Approach
The complexity of Grid environments is growing as more projects and applications appear in this quick-evolving domain. Widespread applications are distributed over thousands of com...
Franck Bonnassieux, Robert Harakaly, Pascale Prime...