Sciweavers

1098 search results - page 155 / 220
» Usage-Centered Engineering for Web Applications
Sort
View
141
Voted
FIW
2009
120views Communications» more  FIW 2009»
15 years 1 months ago
Software Security Vulnerabilities Seen As Feature Interactions
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
Guy-Vincent Jourdan
161
Voted
EUROSYS
2006
ACM
16 years 18 days ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
170
Voted
WWW
2011
ACM
14 years 10 months ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...
134
Voted
SCW
2006
IEEE
15 years 9 months ago
Towards Unified QoS/SLA Ontologies
This paper reports on work in progress to produce a unified Quality of Service (QoS) ontology This ontology must be applicable to the main scenarios currently identified such as Q...
Glen Dobson, Alfonso Sánchez-Macián
134
Voted
GCC
2005
Springer
15 years 9 months ago
Characterizing Services Composeability and OWL-S Based Services Composition
Grid has emerged as a new paradigm for integration within dynamic virtual enterprises. Given a service-oriented Grid environment, more complex, value-added sophisticated services a...
Zhonghua Yang, Jing-Bing Zhang, Jiao Tao, Robert K...