Sciweavers

1863 search results - page 333 / 373
» Security Architecture for Web Services
Sort
View
KBSE
2005
IEEE
14 years 3 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
ICDCS
2010
IEEE
13 years 11 months ago
Efficient Workstealing for Multicore Event-Driven Systems
Many high-performance communicating systems are designed using the event-driven paradigm. As multicore platforms are now pervasive, it becomes crucial for such systems to take adva...
Fabien Gaud, Sylvain Geneves, Renaud Lachaize, Bap...
SMC
2007
IEEE
146views Control Systems» more  SMC 2007»
14 years 4 months ago
Blender plugin implementations for 3D collaborative work
— The development of networking and client/server systems over the Internet had led to many collaborative work software applications. To extend the graphic design collaborative p...
Martin Lesage, Omar Cherkaoui, Faysal Abouzaid, Ma...
WECWIS
2003
IEEE
128views ECommerce» more  WECWIS 2003»
14 years 3 months ago
PCFinder: An Intelligent Product Recommendation Agent for E-Commerce
There are many e-commerce applications on the web. A common shortcoming is the lack of customer service and marketing analysis tools in most ecommerce web sites. In order to overc...
Bin Xiao, Esma Aïmeur, José Manuel Fer...
HT
2010
ACM
14 years 2 months ago
Conversational tagging in twitter
Users on Twitter, a microblogging service, started the phenomenon of adding tags to their messages sometime around February 2008. These tags are distinct from those in other Web 2...
Jeff Huang, Katherine M. Thornton, Efthimis N. Eft...