Sciweavers

1085 search results - page 210 / 217
» Web Service Composition Using the Web Services Management La...
Sort
View
ISADS
1999
IEEE
13 years 11 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
AIRWEB
2009
Springer
14 years 2 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer
VLDB
2007
ACM
135views Database» more  VLDB 2007»
14 years 1 months ago
DAMIA - A Data Mashup Fabric for Intranet Applications
Damia is a lightweight enterprise data integration service where line of business users can create and catalog high value data feeds for consumption by situational applications. D...
Mehmet Altinel, Paul Brown, Susan Cline, Rajesh Ka...
SAC
2010
ACM
14 years 21 days ago
A semantic web-based approach for personalizing news
Hermes is an ontology-based framework for building news personalization services. This framework consists of a news classification phase, which classifies the news, a knowledge ...
Kim Schouten, Philip Ruijgrok, Jethro Borsje, Flav...
ICDCS
2002
IEEE
14 years 11 days ago
ControlWare: A Middleware Architecture for Feedback Control of Software Performance
Attainment of software performance assurances in open, largely unpredictable environments has recently become an important focus for real-time research. Unlike closed embedded sys...
Ronghua Zhang, Chenyang Lu, Tarek F. Abdelzaher, J...