Results 111 to 120 of about 638,600 (248)
Social Navigation in a Location-Based Information System [PDF]
Much of contextaware application research has dealt with the technical aspects of context capturing and how to interpret the context of a user. Little effort has been spent on the experience and usage of these systems.
Fagerberg, Petra
core +1 more source
“Clubs aren’t like that”: Discos, Deviance and Diegetics in Club Culture Cinema
This article considers ways in which filmmakers have attempted to address the subject of electronic dance music culture on the big screen. In what ways have directors tried to visually represent EDMC in fictional narratives?
Simon Andrew Morrison
doaj
<!--[if gte mso 9]><xml> Normal 0 false false false MicrosoftInternetExplorer4 </xml><![endif]--><!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 10]> <style> /* Style ...
Ingrid Kreissig
doaj
Cloud security and authentication vulnerabilities in SOAP protocol: addressing XML-based attacks
IntroductionThis research addresses the security weaknesses in SOAP-based web services, with a particular focus on authentication vulnerabilities resulting from XML-based attacks, such as Signature Wrapping or Replay Attacks. With an emphasis on the fact
Mozamel M. Saeed
doaj +1 more source
Random Indexing (RI) K-tree is the combination of two algorithms for clustering. Many large scale problems exist in document clustering. RI K-tree scales well with large inputs due to its low complexity.
De Vine, Lance +2 more
core +2 more sources
<!--[if gte mso 9]><xml> Normal 0 false false false MicrosoftInternetExplorer4 </xml><![endif]--><!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 10]> <style> /* Style ...
Noushin Bazzazi +3 more
doaj
<!--[if gte mso 9]><xml> Normal 0 false false false MicrosoftInternetExplorer4 </xml><![endif]--><!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 10]> <style> /* Style ...
Mohammad Ali Javadi +6 more
doaj
Developing web services in a computational grid environment [PDF]
Grid and Web services are both hot topics today. In this paper, we will present some ongoing work and planned future work at the Cambridge eScience Centre.
Hayes, M, Spivack, M, Usher, A, Yang, X
core
Secure SAML validation to prevent XML signature wrapping attacks [PDF]
Pawel Krawczyk
openalex +1 more source
<!--[if gte mso 9]><xml> Normal 0 false false false MicrosoftInternetExplorer4 </xml><![endif]--><!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 10]> <style> /* Style ...
Reza Nabie +2 more
doaj

