Sciweavers

918 search results - page 141 / 184
» Using XML to Integrate Existing Software Systems into the We...
Sort
View
JHSN
2006
267views more  JHSN 2006»
14 years 11 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
WWW
2010
ACM
15 years 5 months ago
New-web search with microblog annotations
Web search engines discover indexable documents by recursively ‘crawling’ from a seed URL. Their rankings take into account link popularity. While this works well, it introduc...
Tom Rowlands, David Hawking, Ramesh Sankaranarayan...
WWW
2009
ACM
15 years 11 months ago
Rapid development of spreadsheet-based web mashups
The rapid growth of social networking sites and web communities have motivated web sites to expose their APIs to external developers who create mashups by assembling existing func...
Woralak Kongdenfha, Boualem Benatallah, Julien Vay...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 5 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
DATE
2006
IEEE
157views Hardware» more  DATE 2006»
15 years 5 months ago
Modeling and simulation of mobile gateways interacting with wireless sensor networks
Sensor networks are emerging wireless technologies; their integration with the existing 2.5G, 3G mobile networks is a key issue to provide advanced services, e.g., health control....
Franco Fummi, Davide Quaglia, Fabio Ricciato, Maur...