Sciweavers

517 search results - page 87 / 104
» The Design and Implementation of the GridLab Information Ser...
Sort
View
ITCC
2005
IEEE
15 years 5 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
CAISE
2004
Springer
15 years 3 months ago
Simple and Minimum-Cost Satisfiability for Goal Models
Abstract. Goal models have been used in Computer Science in order to represent software requirements, business objectives and design qualities. In previous work we have presented a...
Roberto Sebastiani, Paolo Giorgini, John Mylopoulo...
DAWAK
2006
Springer
15 years 3 months ago
Providing Persistence for Sensor Data Streams by Remote WAL
Rapidly changing environments such as robots, sensor networks, or medical services are emerging. To deal with them, DBMS should persist sensor data streams instantaneously. To achi...
Hideyuki Kawashima, Michita Imai, Yuichiro Anzai
TES
2000
Springer
15 years 3 months ago
Active Rules for XML: A New Paradigm for E-Services
XML is rapidly becoming one of the most widely adopted technologies for information exchange and representation. As the use of XML becomes more widespread, we foresee the developme...
Angela Bonifati, Stefano Ceri, Stefano Paraboschi
EUC
2007
Springer
15 years 1 months ago
GPS-Based Location Extraction and Presence Management for Mobile Instant Messenger
Abstract. Location is the most essential presence information for mobile users. In this paper, we present an improved time-based clustering technique for extracting significant lo...
Dexter H. Hu, Cho-Li Wang