Sciweavers

1747 search results - page 38 / 350
» Distributed Systems Technology for Electronic Commerce Appli...
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 1 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
WWW
2005
ACM
15 years 10 months ago
Ensuring required failure atomicity of composite Web services
The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...
Sami Bhiri, Olivier Perrin, Claude Godart
ICCAD
2007
IEEE
88views Hardware» more  ICCAD 2007»
15 years 6 months ago
Extending systems-on-chip to the third dimension: performance, cost and technological tradeoffs
Abstract—Because of the today’s market demand for highperformance, high-density portable hand-held applications, electronic system design technology has shifted the focus from ...
Roshan Weerasekera, Li-Rong Zheng, Dinesh Pamunuwa...
ANSOFT
2002
159views more  ANSOFT 2002»
14 years 9 months ago
Using Component-Based Development and Web Technologies to Support a Distributed Data Management System
Over recent years, "Internet-able" applications have been used to support domains where distributed functionality is essential. This flexibility is also pertinent in situ...
M. Brian Blake, Gail Hamilton, Jeffrey Hoyt
96
Voted
WWW
2003
ACM
15 years 10 months ago
Evaluating SOAP for High Performance Business Applications: Real-Time Trading Systems
Web services, with an emphasis on open standards and flexibility, may provide benefits over existing capital markets integration practices. However, web services must first meet c...
Christopher Kohlhoff, Robert Steele