Sciweavers

5843 search results - page 159 / 1169
» Software Security in Practice
Sort
View
SIGUCCS
2004
ACM
15 years 10 months ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson
SWS
2005
ACM
15 years 10 months ago
Web services enterprise security architecture: a case study
Web Services (WS hereafter) Security is a crucial aspect for technologies based on this paradigm to be completely adopted by the industry. As a consequence, a lot of initiatives h...
Carlos Gutiérrez, Eduardo Fernández-...
FSTTCS
2005
Springer
15 years 10 months ago
Practical Algorithms for Tracking Database Join Sizes
We present novel algorithms for estimating the size of the natural join of two data streams that have efficient update processing times and provide excellent quality of estimates....
Sumit Ganguly, Deepanjan Kesh, Chandan Saha
ESA
2008
Springer
92views Algorithms» more  ESA 2008»
15 years 6 months ago
How Reliable Are Practical Point-in-Polygon Strategies?
We experimentally study the reliability of geometric software for point location in simple polygons. As expected, the code we tested works very well for random query points. Howeve...
Stefan Schirra
IEEEARES
2006
IEEE
15 years 10 months ago
A Component Based Software Architecture for E-Government Applications
The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software sys...
Daniel Beer, Raphael Kunis, Gudula Rünger