Results 51 to 60 of about 18,387 (191)

eIDeCert: a user-centric solution for mobile identification [PDF]

open access: yes, 2011
The necessity to certify one's identity for different purposes and the evolution of mobile technologies have led to the generation of electronic devices such as smart cards, and electronic identities designed to meet daily needs.
Argles, David   +4 more
core   +1 more source

Guided by Principles of Composition: A Domain‐Specific Priors Based Detector for Recognizing Ritual Implements in Thangka

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
We propose GPCDet, a detection framework guided by the composition principles of Thangka paintings, integrating spatial and co‐occurrence priors through a spatial coordinate attention module and a graph convolution network‐auxiliary detection module.
Jiachen Li   +7 more
wiley   +1 more source

Web Single Sign-On Authentication using SAML [PDF]

open access: yes, 2009
Companies have increasingly turned to application service providers (ASPs) or Software as a Service (SaaS) vendors to offer specialized web-based services that will cut costs and provide specific and focused applications to users.
Lewis, James E., Lewis, Kelly D.
core  

AMRerank: A Framework for Library Migration Recommendations Using Multi‐Agent Analysis and Data‐Driven Reranking

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Open‐source libraries are indispensable for modern software development but can create substantial maintenance burdens when they become deprecated or unmaintained. Selecting an appropriate replacement among many candidates remains challenging, since methods relying only on historical mining or similarity metrics often miss subtle differences in meaning.
Jie Luo   +3 more
wiley   +1 more source

Secure Marketing Website

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
The  Internet  provides business  with  new methods of reaching  and interacting with ·customers as  well as  improving inter  and  intra  business communication. In  this  research, a  soft.ware  marketing web  site  with  a security tools   is  
A. F. Sabeb
doaj  

Design Pattern Prediction From Source Code Using LLM–Based Feature Engineering and SVM Classification

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Typical source code (SC) metrics are useful in identifying and predicting the used design patterns in typical Java and Kotlin projects. However, typical SC metrics–based prediction tends to be less accurate. This research presents a novel idea of detecting various design patterns in a code with the help of large language model (LLM)–based features ...
Sirojiddin Komolov   +3 more
wiley   +1 more source

New Proposed Method For Web Services Security

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be ...
H. j Muhasin
doaj  

The Clarens web services architecture [PDF]

open access: yes, 2003
Clarens is a uniquely flexible web services infrastructure providing a unified access protocol to a diverse set of functions useful to the HEP community. It uses the standard HTTP protocol combined with application layer, certificate based authentication
Aslakson, Eric   +5 more
core   +1 more source

Developing a Secure Cyberphysical System for Altitude Chambers

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre   +4 more
wiley   +1 more source

JXTA security in basic peer operations [PDF]

open access: yes, 2008
Open Access ...
Arnedo Moreno, Joan   +1 more
core  

Home - About - Disclaimer - Privacy