Sciweavers

3003 search results - page 572 / 601
» Software Security: Building Security In
Sort
View
IPM
2002
106views more  IPM 2002»
13 years 8 months ago
A feature mining based approach for the classification of text documents into disjoint classes
This paper proposes a new approach for classifying text documents into two disjoint classes. The new approach is based on extracting patterns, in the form of two logical expressio...
Salvador Nieto Sánchez, Evangelos Triantaph...
COMPUTER
1999
95views more  COMPUTER 1999»
13 years 8 months ago
Wide-Area Computing: Resource Sharing on a Large Scale
abstract over a complex set of resources and provide a high-level way to share and manage them over the network. To be effective, such a system must address the challenges posed by...
Andrew S. Grimshaw, Adam Ferrari, Frederick Knabe,...
NETWORK
2008
233views more  NETWORK 2008»
13 years 8 months ago
WhozThat? evolving an ecosystem for context-aware mobile social networks
One of the most compelling social questions, which until now was left unanswered by current technology, is "Who's that?" This question is usually asked about a new ...
Aaron Beach, Mike Gartrell, Sirisha Akkala, Jack E...
INTERNET
2010
119views more  INTERNET 2010»
13 years 7 months ago
A Chat Application in Lift
s the HTTP request–response cycle rather than wrapping HTTP concepts in APIs. This means you put HTML element definition and action in the same place: var name = "" SHt...
David Pollak, Steve Vinoski
JCS
2010
104views more  JCS 2010»
13 years 7 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith