Sciweavers

527 search results - page 95 / 106
» Constructing Secure Web Service Based on XML
Sort
View
IEEEARES
2009
IEEE
15 years 4 months ago
Generating User-Understandable Privacy Preferences
—Making use of the World Wide Web’s numerous services increasingly requires the disclosure of personal user data. While these data represent an important value for service prov...
Jan Kolter, Günther Pernul
WWW
2010
ACM
15 years 4 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk
PPDP
2010
Springer
14 years 7 months ago
Tabling for transaction logic
Transaction Logic is a logic for representing declarative and procedural knowledge in logic programming, databases, and AI. It has been successful in areas as diverse as workflows...
Paul Fodor, Michael Kifer
WORDS
2003
IEEE
15 years 3 months ago
Event-Driven Support of Real-Time Sentient Objects
The emergence of applications operating independently of direct human control is inevitable. Research on high-level models for this class of applications— e.g. on autonomous age...
Paulo Veríssimo, Antonio Casimiro
MUE
2008
IEEE
144views Multimedia» more  MUE 2008»
15 years 4 months ago
Toward a Message-Oriented Application Model and its Middleware Support in Ubiquitous Environments
Context-awareness has become a distinguishing feature of Ubiquitous systems. Contrary to desktop and web applications, Ubiquitous applications gather environmental context and pro...
Chun-Feng Liao, Ya-Wen Jong, Li-Chen Fu