Sciweavers

COMSUR
2000
202views more  COMSUR 2000»
13 years 4 months ago
A Survey of Trust in Internet Applications
Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy i.e. who is authorised to perform action...
Tyrone Grandison, Morris Sloman
CN
2002
96views more  CN 2002»
13 years 4 months ago
A transparent deployment method of RSVP-aware applications on UNIX
This paper proposes a method, called RLR (RSVP (Resource reSerVation Protocol) library redirection), which can transform legacy Internet applications into RSVP-aware applications ...
Yu-Ben Miao, Wen-Shyang Hwang, Ce-Kuen Shieh
IJNSEC
2006
88views more  IJNSEC 2006»
13 years 4 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
CN
2007
98views more  CN 2007»
13 years 4 months ago
Distributed resolution of feature interactions for internet applications
Internet applications, such as Email, VoIP and WWW, have been enhanced with
Rui Gustavo Crespo, Miguel Carvalho, Luigi Logripp...
ESAW
2000
Springer
13 years 8 months ago
Context-Dependency in Internet-Agent Coordination
The design and development of Internet applications can take advantage of a paradigm based on autonomous and mobile agents. However, agent mobility introduces peculiar coordinatio...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
DATE
2002
IEEE
96views Hardware» more  DATE 2002»
13 years 9 months ago
Embedded System Design Based On Webservices
The structure of Internet applications and scenarios is changing rapidly today. This offers new potential for established technologies and methods to expand their area of applicat...
Achim Rettberg, Wolfgang Thronicke
FATES
2003
Springer
13 years 9 months ago
Automatic Conformance Testing of Internet Applications
Abstract. We adapt and extend the theories used in the general framework of automated software testing in such a way that they become suitable for black-box conformance testing of ...
Harm M. A. van Beek, Sjouke Mauw
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
13 years 9 months ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan
TELETRAFFIC
2007
Springer
13 years 10 months ago
Modeling and Predicting End-to-End Response Times in Multi-tier Internet Applications
Many Internet applications employ multi-tier software architectures. The performance of such multi-tier Internet applications is typically measured by the end-toend response times...
Sandjai Bhulai, Swaminathan Sivasubramanian, Rober...
KIVS
2009
Springer
13 years 11 months ago
A Middleware for the Controlled Information Exchange Between Online Games and Internet Applications
Multiplayer Online Games (MOGs) are a thriving market leading to a multiplicity of game related internet applications. Enabling information exchange between games and these applica...
Sonja Bergsträsser, Tomas Hildebrandt, Christ...