Sciweavers

1469 search results - page 291 / 294
» Web Services and Service-Oriented Architectures
Sort
View
119
Voted
CGO
2006
IEEE
15 years 5 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
ICICS
2005
Springer
15 years 5 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
IICS
2009
Springer
15 years 4 months ago
Bi-directional Distribution of eLearning Content for Cross-technology Learning Communities
: This article describes the use of a service-oriented architecture to bridge the gap between different eLearning types and tools. The basic concept is a bi-directional distributio...
Raphael Zender, Enrico Dressler, Ulrike Lucke, Dja...
ICEIS
2000
IEEE
15 years 4 months ago
A Holistic Information Systems Strategy for Organisational Management-HISSOM
Alignment of organisational strategy with Information Systems Strategy (ISS) has become critical as adoption of Information Systems (IS) over the last 50 years has escalated. IS c...
David Lanc, Lachlan M. MacKinnon
ERCIMDL
2000
Springer
185views Education» more  ERCIMDL 2000»
15 years 3 months ago
CORC: Helping Libraries Take a Leading Role in the Digital Age
The OCLC Cooperative Online Resource Catalog is helping librarians thrive in the digital age. Librarians are using CORC to select, describe, maintain, and provide guided access to ...
Kay Covert