Sciweavers

4 search results - page 1 / 1
» isict 2004
Sort
View
60
Voted
ISICT
2004
15 years 9 days ago
Business rules domains and business rules modeling
Nicholas Zsifkov, Radu Campeanu
120
Voted
ISICT
2004
15 years 9 days ago
The design of the IPACS distributed software architecture
The IPACS-project (Integrated Performance Analysis of Computer Systems) was founded by the Federal Department of Education, Science, Research and Technology (BMBF) in the program ...
Heinz Kredel, Matthias Merz
77
Voted
ISICT
2004
15 years 9 days ago
Preventing type flaw attacks on security protocols with a simplified tagging scheme
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...
Yafen Li, Wuu Yang, Ching-Wei Huang
93
Voted
ISICT
2004
15 years 9 days ago
Extending desktop applications to the web
Web applications have become the major means to allow ubiquitous access to backend systems via a web browser. Several technologies such as JSP, ASP.NET, or Java Server Faces exist ...
Arno Puder