Sciweavers

90 search results - page 13 / 18
» Electronic Roads in the Information Society
Sort
View
WWW
2010
ACM
15 years 5 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
ICSEA
2006
IEEE
15 years 4 months ago
A Conceptual Framework for Business Process Engineering: A Case Study
— this paper discusses a conceptual framework for the requirements engineering process for e-school applications offering a service to the information society. The e-school appli...
Zeljka Car, Hrvoje Belani, Antun Caric
EICS
2010
ACM
15 years 3 months ago
Collaboratively maintaining semantic consistency of heterogeneous concepts towards a common concept set
In e-business, creating a common concept set for business integration, interoperation and interaction has to consider the heterogeneity reality of different interpretations from m...
Jingzhi Guo, Iok Ham Lam, Chun Chan, Guangyi Xiao
IICAI
2003
14 years 11 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
WWW
2005
ACM
15 years 10 months ago
Diversified SCM standard for the Japanese retail industry
In this paper, we present the concept of a diversified SCM (supply chain management) standard and distributed hub architecture which were used in B2B experiments for the Japanese ...
Koichi Hayashi, Naoki Koguro, Reki Murakami