Sciweavers

2036 search results - page 70 / 408
» Using and Abusing XML
Sort
View
DMKD
2003
ACM
151views Data Mining» more  DMKD 2003»
14 years 3 months ago
Assuring privacy when big brother is watching
Homeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and...
Murat Kantarcioglu, Chris Clifton
HICSS
2000
IEEE
139views Biometrics» more  HICSS 2000»
14 years 2 months ago
Capacity Payments and the Pricing of Reliability in Competitive Generation Markets
: In restructured electric power industries around the world, power pool designers have enabled generators to earn revenues consisting of energy and capacity payments. This paper d...
Angela S. Chuang, Felix F. Wu
VIROLOGY
2008
95views more  VIROLOGY 2008»
13 years 10 months ago
On JavaScript Malware and related threats
The term JavaScript Malware describes attacks that abuse the web browser's capabilities to execute malicious script-code within the victim's local execution context. Unli...
Martin Johns
SIGMOD
2005
ACM
136views Database» more  SIGMOD 2005»
14 years 10 months ago
Peer-to-peer management of XML data: issues and research challenges
Peer-to-peer (p2p) systems are attracting increasing attention as an efficient means of sharing data among large, diverse and dynamic sets of users. The widespread use of XML as a...
Georgia Koloniari, Evaggelia Pitoura
CARDIS
2004
Springer
149views Hardware» more  CARDIS 2004»
14 years 3 months ago
Checking and Signing XML Documents on Java Smart Cards
: One major challenge for digitally signing a document is the so called “what you see is what you sign” problem. XML as a meta language for encoding semistructured data offers ...
Nils Gruschka, Florian Reuter, Norbert Luttenberge...