Sciweavers

6137 search results - page 1186 / 1228
» Securing Collaborative Applications
Sort
View
USENIX
2008
13 years 11 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
DAGSTUHL
2010
13 years 10 months ago
Visual Simulation of Flow
We have adopted a numerical method from computational fluid dynamics, the Lattice Boltzmann Method (LBM), for real-time simulation and visualization of flow and amorphous phenomen...
Arie E. Kaufman, Ye Zhao
SIMUTOOLS
2008
13 years 10 months ago
Simulating SMEPP middleware
Embedded Peer-to-Peer Systems (EP2P) represent a new challenge in the development of software for distributed systems. The main objective of the SMEPP (Secure Middleware for Embed...
Javier Barbarán, Carlos Bonilla, Jose &Aacu...
ODRL
2004
13 years 10 months ago
Interoperability between ODRL and MPEG-21 REL
Two main Rights Expression Languages (RELs) exist to describe licenses governing the access to digital content: ODRL (Open Digital Rights Language) and MPEG-21 REL. Both RELs are ...
Josep Polo, Jose Prados, Jaime Delgado
IADIS
2003
13 years 10 months ago
Paradigm Shifts and Business Processes: A Case Study
The vast majority of IT systems are implemented using a traditional procedural paradigm approach using a suitable procedural language such as COBOL. However, with recent developme...
Paul Maclear, Paul Darbyshire
« Prev « First page 1186 / 1228 Last » Next »