Sciweavers

1943 search results - page 218 / 389
» Web application security engineering
Sort
View
110
Voted
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
EUROSYS
2007
ACM
16 years 12 days ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
GECCO
2005
Springer
175views Optimization» more  GECCO 2005»
15 years 8 months ago
An approach for QoS-aware service composition based on genetic algorithms
Web services are rapidly changing the landscape of software engineering. One of the most interesting challenges introduced by web services is represented by Quality Of Service (Qo...
Gerardo Canfora, Massimiliano Di Penta, Raffaele E...
136
Voted
SPRINGSIM
2007
15 years 4 months ago
Studying the impact of web-services implementation of distributed simulation of DEVS and Cell-DEVS models
DEVS is a Modeling and Simulation formalism that has been used to study the dynamics of discrete event systems. Cell-DEVS is a DEVS-based formalism that defines the cell space as ...
Rami Madhoun, Gabriel A. Wainer
183
Voted
SIGMOD
2008
ACM
119views Database» more  SIGMOD 2008»
16 years 3 months ago
Report on the Principles of Provenance Workshop
Provenance, or records of the origin, context, custody, derivation or other historical information about a (digital) object, has recently become an important research topic in a n...
James Cheney, Peter Buneman, Bertram Ludäscher