Sciweavers

1152 search results - page 209 / 231
» Web Service in Context and Dependency-Aware Service Composit...
Sort
View
FC
2005
Springer
94views Cryptology» more  FC 2005»
15 years 3 months ago
Modeling and Preventing Phishing Attacks
We introduce tools to model and describe phishing attacks, allowing a visualization and quantification of the threat on a given complex system of web services. We use our new mod...
Markus Jakobsson
MDM
2004
Springer
111views Communications» more  MDM 2004»
15 years 2 months ago
Mobile Agents: Right Concept, Wrong Approach
This position paper looks back and takes stock in the context of mobile agent technologies1 . Our claim is that mobile agent technologies received wrong attention. Partially becau...
Dag Johansen
SEUS
2008
IEEE
15 years 3 months ago
Analysis of User Perceived QoS in Ubiquitous UMTS Environments Subject to Faults
This paper provides a QoS analysis of a dynamic, ubiquitous UMTS network scenario in the automotive context identified in the ongoing EC HIDENETS project. The scenario comprises d...
Andrea Bondavalli, Paolo Lollini, Leonardo Montecc...
177
Voted
AOIS
2006
14 years 11 months ago
Providing Contextual Norm Information in Open Multi-Agent Systems
Agents can freely migrate among open MASs in order to obtain resources or services not found locally. In this scenario, agent actions should be guided for avoiding unexpected behav...
Carolina Howard Felicíssimo, Ricardo Choren...
93
Voted
DAIS
2003
14 years 11 months ago
Jironde: A Flexible Framework for Making Components Transactional
Abstract. It is generally agreed that one of the key services of componentbased systems are transactions. However, an agreement on how components should be involved in transactions...
Marek Prochazka