Sciweavers

742 search results - page 112 / 149
» XML and web services security
Sort
View
78
Voted
ISORC
2005
IEEE
15 years 3 months ago
Self-Tuning Planned Actions Time to Make Real-Time SOAP Real
This paper proposes a new method for programming and controlling distributed tasks. Applications declare behavior patterns that are used to automatically predict and reserve resou...
Johannes Helander, Stefan B. Sigurdsson
ARCS
2004
Springer
15 years 2 months ago
Extending the MVC Design Pattern towards a Task-Oriented Development Approach for Pervasive Computing Applications
Abstract. This paper addresses the implementation of pervasive Java Web applications using a development approach that is based on the Model-ViewController (MVC) design pattern. We...
Patrick Sauter, Gabriel Vögler, Günther ...
86
Voted
FLAIRS
2003
14 years 11 months ago
Design and Implementation of Anatomic Pathology Database System
This paper describes the design and implementation of the University of Florida’s Anatomic Pathology Database System. The first phase of the system consists of the patient recor...
Changwoo Yoon, James K. Massey, William H. Donnell...
COLING
2010
14 years 4 months ago
LTP: A Chinese Language Technology Platform
LTP (Language Technology Platform) is an integrated Chinese processing platform which includes a suite of high performance natural language processing (NLP) modules and relevant c...
Wanxiang Che, Zhenghua Li, Ting Liu
100
Voted
NDSS
2003
IEEE
15 years 2 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet