Sciweavers

1362 search results - page 99 / 273
» From Research to Business: The Web of Linked Data
Sort
View
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
15 years 5 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
WWW
2005
ACM
16 years 2 months ago
Web services security configuration in a service-oriented architecture
Security is one of the major concerns when developing missioncritical business applications, and this concern motivated the Web Services Security specifications. However, the exis...
Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamu...
WWW
2004
ACM
16 years 2 months ago
Fine-grained, structured configuration management for web projects
Researchers in Web engineering have regularly noted that existing Web application development environments provide little support for managing the evolution of Web applications. K...
Tien Nhut Nguyen, Ethan V. Munson, Cheng Thao
PPAM
2005
Springer
15 years 7 months ago
Grids for Real Time Data Applications
We describe our work in building support for streaming data services for Geographical Information System Grid services. We examine how streaming approaches may be used to increase ...
Geoffrey Fox, Mehmet S. Aktas, Galip Aydin, Hasan ...
DEXAW
2007
IEEE
124views Database» more  DEXAW 2007»
15 years 3 months ago
A Process Improvement Approach to Improve Web Form Design and Usability
The research presented in this paper is an examination of how the concepts used in process improvement may be applied to a web form to improve design and usability. Although much ...
Sean Thompson, Torab Torabi