Sciweavers

630 search results - page 69 / 126
» Acceptable internet use policy
Sort
View
SEMWEB
2005
Springer
14 years 1 months ago
Debugging OWL-DL Ontologies: A Heuristic Approach
Abstract. After becoming a W3C Recommendation, OWL is becoming increasingly widely accepted and used. However most people still find it difficult to create and use OWL ontologies...
Hai Wang, Matthew Horridge, Alan L. Rector, Nick D...
INTERNET
2007
113views more  INTERNET 2007»
13 years 7 months ago
REST Eye for the SOA Guy
it’s hardly Earth-shattering: abstracting your business services and separating them from your applications can yield an overall system that’s easier to build, maintain, and ex...
Steve Vinoski
WSC
2008
13 years 10 months ago
Simulation of the research process
This paper presents first steps towards the development of a formal model of the research process. We evaluate the use of simulation as a tool for the evaluation of research strat...
Muaz Niazi, Amir Hussain, Abdul Rauf Baig, Saeed B...
JCIT
2008
103views more  JCIT 2008»
13 years 7 months ago
Implementation of Filter Reverse Search System based on Spatial Relationships of Filters
Firewall is a useful technique that ensures network security. Firewall examines network packets and determines whether to accept or deny them based on an ordered set of filters. I...
Yi Yin, Kazuaki Hida, Yoshiaki Katayama, Naohisa T...
MONET
2002
155views more  MONET 2002»
13 years 7 months ago
A Prioritized Real-Time Wireless Call Degradation Framework for Optimal Call Mix Selection
This paper describes a framework for selecting the optimal call mix to be admitted while employing a bandwidth degradation policy in a wireless cellular network. The optimal proper...
Gergely V. Záruba, Imrich Chlamtac, Sajal K...