Sciweavers

1744 search results - page 137 / 349
» The Steganographic File System
Sort
View
HASE
2002
IEEE
15 years 8 months ago
Extending WSDL to Facilitate Web Services Testing
Web services might be the most popular and powerful software development technology in today’s software world. Yet it brings software developers and tester a lot of challenges a...
Wei-Tek Tsai, Raymond A. Paul, Yamin Wang, Chun Fa...
108
Voted
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
15 years 7 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
108
Voted
WSC
2004
15 years 5 months ago
XML-Based Supply Chain Simulation Modeling
We describe a different approach to using XML to support the simulation modeling of supply chains. Instead of using XML to specify the simulation constructs, as most previous appr...
Dean C. Chatfield, Terry P. Harrison, Jack C. Hayy...
134
Voted
HOTOS
2007
IEEE
15 years 7 months ago
Purely Functional System Configuration Management
System configuration management is difficult because systems evolve in an undisciplined way: packages are upgraded, configuration files are edited, and so on. The management of ex...
Eelco Dolstra, Armijn Hemel
130
Voted
IPPS
2007
IEEE
15 years 10 months ago
Online Grid Replication Optimizers to Improve System Reliability
In a data intensive Grid system, many data replica schemes and models have been proposed to improve the system response time or data consistency, but little attention has been pai...
Ming Lei, Susan V. Vrbsky, Zijie Qi