Sciweavers

1943 search results - page 220 / 389
» Web application security engineering
Sort
View
GCC
2005
Springer
15 years 8 months ago
Using Fuzzy Cognitive Map to Effectively Classify E-Documents and Application
In the current Web, e-document has been the most common vehicle for delivering and exchanging information. As the amount of e-documents has grown enormously, effective classificati...
Jianzeng Wang, Yunpeng Xing, Peng Shi, Fei Guo, Zh...
CORR
2008
Springer
111views Education» more  CORR 2008»
15 years 3 months ago
XML Rewriting Attacks: Existing Solutions and their Limitations
Web Services are web-based applications made available for web users or remote Web-based programs. In order to promote interoperability, they publish their interfaces in the so-ca...
Azzedine Benameur, Faisal Abdul Kadir, Serge Fenet
250
Voted
FCSC
2011
413views VLSI» more  FCSC 2011»
14 years 6 months ago
Type-2 fuzzy description logic
Description logics (DLs) are widely employed in recent semantic web application systems. However, classical description logics are limited when dealing with imprecise concepts and ...
Ruixuan Li, Kunmei Wen, Xiwu Gu, Yuhua Li, Xiaolin...
COMPUTER
2004
79views more  COMPUTER 2004»
15 years 3 months ago
Extending the Reach of Business Processes
partners are abstracted as Web services, we have introduced additional constructs to represent human users and define human interaction patterns. Each business process defined in o...
Dipanjan Chakraborty, Hui Lei
ICSE
1997
IEEE-ACM
15 years 7 months ago
Reuse of Off-the-Shelf Components in C2-Style Architectures
-- Reuse of large-grain software components offers the potential for significant savings in application development cost and time. Successful component reuse and substitutability ...
Nenad Medvidovic, Peyman Oreizy, Richard N. Taylor