Sciweavers

JSW
2007
124views more  JSW 2007»
13 years 11 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
JSW
2007
66views more  JSW 2007»
13 years 11 months ago
Implementing Model-Based Data Structures using Transient Model Extensions
— Software is often constructed using a layered approach to encapsulate various functionality in corresponding layers. Individual requirements of each layer demand layer specifi...
Michael Thonhauser, Gernot Schmoelzer, Christian K...
JSW
2007
90views more  JSW 2007»
13 years 11 months ago
Fine-Grained and Scalable Message Protection in Sensitive Organizations
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...
Joon S. Park, Ganesh Devarajan
JSW
2007
102views more  JSW 2007»
13 years 11 months ago
Model-driven Engineering for Early QoS Validation of Component-based Software Systems
— Model-driven engineering (MDE) techniques are increasingly being used to address many of the development and operational lifecycle concerns of large-scale component-based syste...
James H. Hill, Aniruddha S. Gokhale
JSW
2007
115views more  JSW 2007»
13 years 11 months ago
Modeling Network Behaviour By Full-System Simulation
— Due to the network technology advances, an order-of-magnitude jump has been produced in the network bandwidth. This fact has returned to wake up the interest on protocol offloa...
Andrés Ortiz, Julio Ortega, Antonio F. D&ia...
JSW
2007
102views more  JSW 2007»
13 years 11 months ago
A Novel Framework for Building Distributed Data Acquisition and Monitoring Systems
— We propose a novel framework for building a distributed data acquisition and monitoring system. Our novel framework is mainly based on XML leverages and OPC (Openness, Producti...
Vu Van Tan, Dae-Seung Yoo, Myeong-Jae Yi
JSW
2007
126views more  JSW 2007»
13 years 11 months ago
On Remote and Virtual Experiments in eLearning
— The science of physics is based on theories and models as well as experiments: the former structure relations and simplify reality to a degree such that predictions on physical...
Sabina Jeschke, Harald Scheel, Thomas Richter, Chr...
JSW
2007
97views more  JSW 2007»
13 years 11 months ago
Using Aspect Programming to Secure Web Applications
—As the Internet users increase, the need to protect  web servers from malicious users has become a priority in  many   organizations   and   companies.   ...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...
JSW
2007
151views more  JSW 2007»
13 years 11 months ago
Architecture Potential Analysis: A Closer Look inside Architecture Evaluation
— The share of software in embedded systems has been growing permanently in the recent years. Thus, software architecture as well as its evaluation have become important parts of...
Bastian Florentz, Michaela Huhn
JSW
2007
106views more  JSW 2007»
13 years 11 months ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain