Sciweavers

2336 search results - page 460 / 468
» A Proposed Methodology for Web Development
Sort
View
SEMWEB
2009
Springer
14 years 2 months ago
RiMOM Results for OAEI 2009
In this report, we give a brief explanation of how RiMOM obtains the results at OAEI 2009 Campaign, especially in the new Instance Matching track. At first, we show the basic alig...
Xiao Zhang, Qian Zhong, Feng Shi, Juanzi Li, Jie T...
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 1 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
ASPLOS
2006
ACM
14 years 1 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
CLEF
2005
Springer
14 years 1 months ago
20th Century Esfinge (Sphinx) Solving the Riddles at CLEF 2005
Abstract. Esfinge is a general domain Portuguese question answering system. It tries to apply simple techniques to large amounts of text. Esfinge participated last year in the mono...
Luís Costa
ICSOC
2004
Springer
14 years 25 days ago
Assured service quality by improved fault management
The paradigm shift from device-oriented to service-oriented management has also implications to the area of event correlation. Today’s event correlation mainly addresses the cor...
Andreas Hanemann, Martin Sailer, David Schmitz