Sciweavers

6137 search results - page 1157 / 1228
» Securing Collaborative Applications
Sort
View
CORR
2008
Springer
111views Education» more  CORR 2008»
13 years 8 months ago
XML Rewriting Attacks: Existing Solutions and their Limitations
Web Services are web-based applications made available for web users or remote Web-based programs. In order to promote interoperability, they publish their interfaces in the so-ca...
Azzedine Benameur, Faisal Abdul Kadir, Serge Fenet
FUIN
2008
128views more  FUIN 2008»
13 years 8 months ago
Impact of Asynchrony on the Behavior of Rational Selfish Agents
The behavior of rational selfish agents has been classically studied in the framework of strategic games in which each player has a set of possible actions, players choose actions ...
David Ilcinkas, Andrzej Pelc
CN
2006
124views more  CN 2006»
13 years 8 months ago
Packet classification using diagonal-based tuple space search
Multidimensional packet classification has attracted considerable research interests in the past few years due to the increasing demand on policy based packet forwarding and secur...
Fu-Yuan Lee, Shiuh-Pyng Shieh
COMCOM
2006
154views more  COMCOM 2006»
13 years 8 months ago
Wireless sensor networks for personal health monitoring: Issues and an implementation
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Aleksandar Milenkovic, Chris Otto, Emil Jovanov
IJVR
2008
118views more  IJVR 2008»
13 years 8 months ago
Use of Technology Enhanced Education to Improve Teaching and Learning Process
The modern world continues to change as Information Technology (IT) related applications proceed to evolve at a rapid pace. The need for IT continues to grow as we begin to meaning...
Daniela Marghitu, Elizabeth Zylla-Jones, Santosh B...
« Prev « First page 1157 / 1228 Last » Next »