Sciweavers

1269 search results - page 252 / 254
» Dynamic Web Service Calls for Data Integration
Sort
View
IDTRUST
2009
ACM
15 years 4 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
IADIS
2003
14 years 10 months ago
Using Opnet Modeler to Analyse Galileo Communication Networks
Galileo is a European initiative to develop and deploy an independent global satellite-based navigation system. It consists of a Medium Earth Orbit sat ellite constellation transm...
Filipa Borrego, Juan-Antonio Martinez Rosique, Man...
83
Voted
ICETE
2004
204views Business» more  ICETE 2004»
14 years 10 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
95
Voted
VLDB
2005
ACM
162views Database» more  VLDB 2005»
15 years 2 months ago
FiST: Scalable XML Document Filtering by Sequencing Twig Patterns
In recent years, publish-subscribe (pub-sub) systems based on XML document filtering have received much attention. In a typical pubsub system, subscribed users specify their inte...
Joonho Kwon, Praveen Rao, Bongki Moon, Sukho Lee
110
Voted
TKDE
2011
528views more  TKDE 2011»
14 years 4 months ago
The CoQUOS Approach to Continuous Queries in Unstructured Overlays
—The current peer-to-peer (P2P) content distribution systems are constricted by their simple on-demand content discovery mechanism. The utility of these systems can be greatly en...
Lakshmish Ramaswamy, Jianxia Chen