Sciweavers

984 search results - page 7 / 197
» The Use of Software Agents as Proxies
Sort
View
120
Voted
IAT
2010
IEEE
14 years 9 months ago
Modular JADE Agents Design and Implementation Using ASEME
ASEME is an emerging Agent Oriented Software Engineering (AOSE) methodology. The Model-Driven Engineering (MDE) paradigm encourages software modelers to automate the transition of...
Nikolaos I. Spanoudakis, Pavlos Moraitis
101
Voted
WWW
2009
ACM
16 years 10 days ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim
AINTEC
2007
Springer
15 years 5 months ago
WOD - Proxy-Based Web Object Delivery Service
With the tremendous growth of World Wide Web (WWW), the door has been opened to a multitude of services and information for even the most casual of users. Today, many wireless and ...
Kai-Hsiang Yang, Jan-Ming Ho
106
Voted
AMAI
2005
Springer
14 years 11 months ago
Auction design with costly preference elicitation
We consider auction design in a setting with costly preference elicitation. Well designed auctions can help to avoid unnecessary elicitation while determining efficient allocations...
David C. Parkes
99
Voted
CSMR
1998
IEEE
15 years 4 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont