Sciweavers

5790 search results - page 850 / 1158
» Distributed programming with distributed authorization
Sort
View
110
Voted
GCC
2003
Springer
15 years 8 months ago
Toward the Composition of Semantic Web Services
This paper introduces a method for automatic composition of semantic web services using linear logic theorem proving. The method uses semantic web service language (DAML-S) for ext...
Jinghai Rao, Xiaomeng Su
129
Voted
ICALP
2003
Springer
15 years 8 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
104
Voted
IPSN
2003
Springer
15 years 8 months ago
Beyond Average: Toward Sophisticated Sensing with Queries
High-level query languages are an attractive interface for sensor networks, potentially relieving application programmers from the burdens of distributed, embedded programming. In ...
Joseph M. Hellerstein, Wei Hong, Samuel Madden, Ky...
108
Voted
ACSAC
2002
IEEE
15 years 7 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...
120
Voted
HICSS
2002
IEEE
155views Biometrics» more  HICSS 2002»
15 years 7 months ago
Towards Knowledge-Sharing and Learning in Virtual Professional Communities
This paper describes a program of research designed to understand how knowledge-sharing and learning can be supported in virtual communities. To conduct this research, we propose ...
Michael Bieber, Il Im, Ronald E. Rice, Ricki Goldm...