Sciweavers

6844 search results - page 1215 / 1369
» Web Service Security
Sort
View
JUCS
2008
162views more  JUCS 2008»
15 years 3 months ago
Composition and Run-time Adaptation of Mismatching Behavioural Interfaces
Abstract: Reuse of software entities such as components or Web services raise composition issues since, most of the time, they present mismatches in their interfaces. These mismatc...
Javier Cámara, Gwen Salaün, Carlos Can...
140
Voted
ENVSOFT
2007
96views more  ENVSOFT 2007»
15 years 3 months ago
Next Generation GRIDs for environmental science
Abstract: GRIDs technology has developed from first generation, supplier-specific and configurationspecific systems through second generation systems providing metacomputing facili...
Keith G. Jeffery
MICRO
2007
IEEE
113views Hardware» more  MICRO 2007»
15 years 3 months ago
The High Cost of a Cheap Lesson
y abstract, it is grounded in the experience of many markets. As I will illustrate, it explains much strategic behavior. Information spreads With a bit of effort, any technically s...
Shane Greenstein
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
15 years 2 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
RAID
2010
Springer
15 years 2 months ago
Fast-Flux Bot Detection in Real Time
The fast-flux service network architecture has been widely adopted by bot herders to increase the productivity and extend the lifespan of botnets’ domain names. A fast-flux bot...
Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen
« Prev « First page 1215 / 1369 Last » Next »