Sciweavers

4719 search results - page 225 / 944
» Applications = Components GLoo
Sort
View
IEEESP
2011
14 years 7 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
ICDE
2007
IEEE
337views Database» more  ICDE 2007»
16 years 5 months ago
The New Casper: A Privacy-Aware Location-Based Database Server
This demo presents Casper; a framework in which users entertain anonymous location-based services. Casper consists of two main components; the location anonymizer that blurs the u...
Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref
GCC
2003
Springer
15 years 9 months ago
Interaction Compatibility: An Essential Ingredient for Service Composition
Common to Grid services, Web Services, software agents and software components is that they are independently built and provide services aimed for composition. A key issue is wheth...
Jun Han
WOSP
2000
ACM
15 years 8 months ago
How system architectures impede interoperability
Interoperability problems arise when complex software systems are constructed by integrating distinct, and often heterogeneous, components. By performing interoperability analysis...
Leigh A. Davis, Jamie Payton, Rose F. Gamble
WETICE
2003
IEEE
15 years 9 months ago
A Case Study in Role-based Agent Interactions
Mobile agents are an emerging approach to develop distributed and parallel applications. They also can be exploited to develop enterprise applications, since they can act as activ...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi