Results 51 to 60 of about 18,387 (191)
eIDeCert: a user-centric solution for mobile identification [PDF]
The necessity to certify one's identity for different purposes and the evolution of mobile technologies have led to the generation of electronic devices such as smart cards, and electronic identities designed to meet daily needs.
Argles, David +4 more
core +1 more source
We propose GPCDet, a detection framework guided by the composition principles of Thangka paintings, integrating spatial and co‐occurrence priors through a spatial coordinate attention module and a graph convolution network‐auxiliary detection module.
Jiachen Li +7 more
wiley +1 more source
Web Single Sign-On Authentication using SAML [PDF]
Companies have increasingly turned to application service providers (ASPs) or Software as a Service (SaaS) vendors to offer specialized web-based services that will cut costs and provide specific and focused applications to users.
Lewis, James E., Lewis, Kelly D.
core
Open‐source libraries are indispensable for modern software development but can create substantial maintenance burdens when they become deprecated or unmaintained. Selecting an appropriate replacement among many candidates remains challenging, since methods relying only on historical mining or similarity metrics often miss subtle differences in meaning.
Jie Luo +3 more
wiley +1 more source
The Internet provides business with new methods of reaching and interacting with ·customers as well as improving inter and intra business communication. In this research, a soft.ware marketing web site with a security tools is
A. F. Sabeb
doaj
Typical source code (SC) metrics are useful in identifying and predicting the used design patterns in typical Java and Kotlin projects. However, typical SC metrics–based prediction tends to be less accurate. This research presents a novel idea of detecting various design patterns in a code with the help of large language model (LLM)–based features ...
Sirojiddin Komolov +3 more
wiley +1 more source
New Proposed Method For Web Services Security
TI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be ...
H. j Muhasin
doaj
The Clarens web services architecture [PDF]
Clarens is a uniquely flexible web services infrastructure providing a unified access protocol to a diverse set of functions useful to the HEP community. It uses the standard HTTP protocol combined with application layer, certificate based authentication
Aslakson, Eric +5 more
core +1 more source
Developing a Secure Cyberphysical System for Altitude Chambers
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre +4 more
wiley +1 more source

