Abstract Most SSL/TLS-based e-commerce applications employ conventional mechanisms for user authentication. These mechanisms—if decoupled from SSL/TLS session establishment—are...
Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo R...
Abstract. Weakly-typed languages such as Cobol often force programrepresent distinct data abstractions using the same low-level physical type. In this paper, we describe a techniqu...
Real world problems such as fire propagation prediction, can often be considered as a compositional combination of multiple, simple but coupled subproblems corresponding to analyt...
John Michopoulos, Panagiota Tsompanopoulou, Elias ...
Structured peer-to-peer overlays provide a natural infrastructure for resilient routing via efficient fault detection and precomputation of backup paths. These overlays can respo...
Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony...
We examine the use of Web services, an XML-based distributed object system, for developing reusable, interoperable services for computational science web portals. This paper descr...
Stephen Mock, Choon-Han Youn, Marlon E. Pierce, Ge...