Sciweavers

1564 search results - page 311 / 313
» Security in the Web Services Framework
Sort
View
CN
2006
79views more  CN 2006»
13 years 5 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
SIGMOD
2004
ACM
262views Database» more  SIGMOD 2004»
14 years 5 months ago
The Next Database Revolution
Database system architectures are undergoing revolutionary changes. Most importantly, algorithms and data are being unified by integrating programming languages with the database ...
Jim Gray
ECOOP
2004
Springer
13 years 9 months ago
A Reflective Approach to Dynamic Software Evolution
In this paper, we present a solution that allows systems to remain active while they are evolving. Our approach goes out from the principle of separated concerns and has two steps....
Peter Ebraert, Tom Tourwé
BMCBI
2010
167views more  BMCBI 2010»
13 years 5 months ago
BisoGenet: a new tool for gene network building, visualization and analysis
Background: The increasing availability and diversity of omics data in the post-genomic era offers new perspectives in most areas of biomedical research. Graph-based biological ne...
Alexander Martin, Maria Elena Ochagavia, Laya C. R...
MEDES
2010
ACM
13 years 16 days ago
Brazilian public software: beyond sharing
This work presents a case of an innovative Brazilian experience of use of free software in public administration as an emergent ecosystem, and the attempt to establish a quality f...
A. M. Alves, Marcelo Schneck de Paula Pessôa