Sciweavers

291 search results - page 58 / 59
» An Online Monitoring Approach for Web services
Sort
View
ICICS
2005
Springer
13 years 11 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
WWW
2005
ACM
14 years 6 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
IICS
2009
Springer
13 years 10 months ago
Bi-directional Distribution of eLearning Content for Cross-technology Learning Communities
: This article describes the use of a service-oriented architecture to bridge the gap between different eLearning types and tools. The basic concept is a bi-directional distributio...
Raphael Zender, Enrico Dressler, Ulrike Lucke, Dja...
VIS
2006
IEEE
214views Visualization» more  VIS 2006»
14 years 6 months ago
Hub-based Simulation and Graphics Hardware Accelerated Visualization for Nanotechnology Applications
The Network for Computational Nanotechnology (NCN) has developed a science gateway at nanoHUB.org for nanotechnology education and research. Remote users can browse through online...
Wei Qiao, Michael McLennan, Rick Kennell, David...
WWW
2006
ACM
14 years 6 months ago
Interactive wrapper generation with minimal user effort
While much of the data on the web is unstructured in nature, there is also a significant amount of embedded structured data, such as product information on e-commerce sites or sto...
Utku Irmak, Torsten Suel