Sciweavers

1365 search results - page 220 / 273
» Simple authentication for the web
Sort
View
ICDCN
2010
Springer
15 years 4 months ago
Poisoning the Kad Network
Abstract. Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer-to-peer system based on a distributed has...
Thomas Locher, David Mysicka, Stefan Schmid, Roger...
89
Voted
EDBT
2009
ACM
123views Database» more  EDBT 2009»
15 years 4 months ago
High-performance information extraction with AliBaba
A wealth of information is available only in web pages, patents, publications etc. Extracting information from such sources is challenging, both due to the typically complex langu...
Peter Palaga, Long Nguyen, Ulf Leser, Jörg Ha...
ICEIS
2009
IEEE
15 years 4 months ago
Relaxing XML Preference Queries for Cooperative Retrieval
Today XML is an essential technology for knowledge management within enterprises and dissemination of data over the Web. Therefore the efficient evaluation of XML queries has been ...
SungRan Cho, Wolf-Tilo Balke
VW
2009
Springer
217views Virtual Reality» more  VW 2009»
15 years 4 months ago
Collaboration in 3D Shared Spaces Using X3D and VRML
—We propose a framework for visual and haptic collaboration in 3D shared virtual spaces. Virtual objects can de declared as shared objects which visual and physical properties ar...
Lei Wei, Alexei Sourin, Herbert Stocker
COLCOM
2008
IEEE
15 years 4 months ago
Supporting Agile Development of Authorization Rules for SME Applications
Custom SME applications for collaboration and workflow have become affordable when implemented as Web applications employing Agile methodologies. Security engineering is still di...
Steffen Bartsch, Karsten Sohr, Carsten Bormann