Sciweavers

25 search results - page 4 / 5
» Introducing QoS to Electronic Commerce Applications
Sort
View
CCR
1998
128views more  CCR 1998»
13 years 6 months ago
OSI distributed transaction processing commitment optimizations
: This paper briefly summarizes the work towards the final version of ‘Distributed Transaction Processing’ (OSI TP). Several well-known optimizations of the presumed abort prot...
Richard Banks, Peter Furniss, Klaus Heien, Hans-R&...
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
14 years 6 days ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
COMPSEC
2008
99views more  COMPSEC 2008»
13 years 6 months ago
SSL/TLS session-aware user authentication revisited
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, and there are only a few technologies available to mitigate the risks. In [OHB05], ...
Rolf Oppliger, Ralf Hauser, David A. Basin
DPD
2002
125views more  DPD 2002»
13 years 6 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung
ICDE
2000
IEEE
115views Database» more  ICDE 2000»
14 years 7 months ago
Optimization Techniques for Data-Intensive Decision Flows
For an enterprise to take advantage of the opportunities afforded by electronic commerce it must be able to make decisions about business transactions in near-realtime. In the com...
Bharat Kumar, François Llirbat, Gang Zhou, ...