Sciweavers

1943 search results - page 213 / 389
» Web application security engineering
Sort
View
150
Voted
WWW
2005
ACM
16 years 4 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...
119
Voted
WWW
2008
ACM
16 years 4 months ago
An initial investigation on evaluating semantic web instance data
Many emerging semantic web applications include ontologies from one set of authors and instance data from another (often much larger) set of authors. Often ontologies are reused a...
Li Ding, Jiao Tao, Deborah L. McGuinness
139
Voted
IAT
2003
IEEE
15 years 8 months ago
Person Name Identification in Chinese Documents Using Finite State Automata
This research is about automatic identification and extraction of person names in Chinese text documents. Solutions to this problem have immediate and extensive applications in ma...
Bing Shen, Zhongfei (Mark) Zhang, Chunfa Yuan
SIGSOFT
2008
ACM
16 years 4 months ago
Experimenting with exception propagation mechanisms in service-oriented architecture
Exception handling is one of the popular means used for improving dependability and supporting recovery in the ServiceOriented Architecture (SOA). This practical experience paper ...
Anatoliy Gorbenko, Alexander Romanovsky, Vyachesla...
JSAC
2007
107views more  JSAC 2007»
15 years 3 months ago
DESENT: decentralized and distributed semantic overlay generation in P2P networks
Abstract— The current approach in web searching, i.e., centralized search engines, rises issues that question their future applicability: 1) coverage and scalability, 2) freshnes...
Christos Doulkeridis, Kjetil Nørvåg, ...