Sciweavers

257 search results - page 34 / 52
» Implementing Fair Non-repudiable Interactions with Web Servi...
Sort
View
DIMVA
2009
14 years 10 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
HUC
1999
Springer
15 years 1 months ago
InfoStick: An Interaction Device for Inter-Appliance Computing
Abstract. Many electric appliances have recently become network reachable, and we would receive better services from them if we could use them in combination. We have therefore dev...
Naohiko Kohtake, Jun Rekimoto, Yuichiro Anzai
ATAL
2005
Springer
15 years 3 months ago
Matchmaking multi-party interactions using historical performance data
Matchmaking will be an important component of future agent and agent-like systems, such as the semantic web. Most research on matchmaking has been directed toward sophisticated ma...
David Lambert, David Robertson
ISPDC
2006
IEEE
15 years 3 months ago
Continuous Software Test Distributed Execution and Integrated into the Globus Toolkit
This article shows how the idea of continuous software testing [23] of a world wide working group can be well integrated into the Grid Computing paradigm using the Globus Toolkit ...
Christoph Reich, Bettina Scharpf
EMISA
2005
Springer
15 years 3 months ago
A Model-Driven Approach for the Rapid Development of E-Negotiation Systems
: Most of today’s e-marketplaces support a single negotiation protocol. The protocol is usually built into the e-marketplace infrastructure, therefore if a new one is introduced ...
Morad Benyoucef, Stefanie Rinderle