Sciweavers

871 search results - page 129 / 175
» A Decentralized Authorization Architecture
Sort
View
DEBU
2010
127views more  DEBU 2010»
14 years 7 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
IJACTAICIT
2010
176views more  IJACTAICIT 2010»
14 years 7 months ago
A Secured Web Services Based E-Commerce Model for SMME Using Digital Identity
This paper deals with redesigning the existing e-commerce architecture that has provided a platform for the large companies to sell their products so that it can provide a place o...
Ashwin B. K., Kumaran K., Madhu Vishwanatham V., M...
VIROLOGY
2010
165views more  VIROLOGY 2010»
14 years 4 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
PROCEDIA
2011
14 years 18 days ago
A Multilevel Parallelism Support for Multi-Physics Coupling
A new challenge in scientific computing is to merge existing simulation models to create new higher fidelity combined (often multi-level) models. While this challenge has been a...
Fang Liu, Masha Sosonkina
HT
2005
ACM
15 years 3 months ago
From the writable web to global editability
The technical and competence requirements for writing content on the web is still one of the major factors that widens the gap between authors and readers. Although tools that sup...
Angelo Di Iorio, Fabio Vitali