Sciweavers

4736 search results - page 946 / 948
» Service Oriented Internet
Sort
View
USS
2010
13 years 5 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
GI
2009
Springer
13 years 5 months ago
Component Governance as a Key Factor for IT Business Alignment of Telecommunications Companies
Abstract: Modern telecommunications companies currently undergo remarkable structural changes to be successful in the Next-Generation markets for communications and content product...
Sebastian Reinisch, Uwe Beyer, Robert Mertens
IJNSEC
2010
163views more  IJNSEC 2010»
13 years 2 months ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
NAR
2010
281views more  NAR 2010»
13 years 2 months ago
PDBselect 1992-2009 and PDBfilter-select
PDBselect (http://bioinfo.tg.fh-giessen.de/pdb select/) is a list of representative protein chains with low mutual sequence identity selected from the protein data bank (PDB) to e...
Sven Griep, Uwe Hobohm
TIP
2010
117views more  TIP 2010»
13 years 2 months ago
Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks
Abstract--Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates ...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu