Sciweavers

1748 search results - page 187 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
136
Voted
GD
2008
Springer
15 years 3 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
148
Voted
MUE
2007
IEEE
149views Multimedia» more  MUE 2007»
15 years 9 months ago
SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission
Securing multimedia transmission has become a challenging issue due to the popularization of real-time multimedia applications such as video surveillance, satellite communication ...
Euijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam
126
Voted
SIGOPSE
2000
ACM
15 years 7 months ago
Multiprocessing and portability for PDAs
The role of small devices in the emerging all-connected computer infrastructure is growing. So are the requirements that the application execution environments face. Portability, ...
Grzegorz Czajkowski
121
Voted
I3E
2003
100views Business» more  I3E 2003»
15 years 4 months ago
Use of Models and Modelling Techniques for Service Development
: E-applications are increasingly being composed from individual services that can be realized with different technologies, such as, e.g., Web Services and standard component techn...
Luís Ferreira Pires, Marten van Sinderen, C...
106
Voted
OOPSLA
2009
Springer
15 years 9 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards