Sciweavers

2607 search results - page 488 / 522
» An Ontology-Based Information Retrieval Model
Sort
View
DRM
2007
Springer
14 years 4 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
IJWIS
2007
181views more  IJWIS 2007»
13 years 10 months ago
Answering queries over incomplete data stream histories
Streams of data often originate from many distributed sources. A distributed stream processing system publishes such streams of data and enables queries over the streams. This allo...
Alasdair J. G. Gray, Werner Nutt, M. Howard Willia...
BMCBI
2004
127views more  BMCBI 2004»
13 years 10 months ago
MolTalk - a programming library for protein structures and structure analysis
Background: Two of the mostly unsolved but increasingly urgent problems for modern biologists are a) to quickly and easily analyse protein structures and b) to comprehensively min...
Alexander V. Diemand, Holger Scheib
SIGOPS
2010
130views more  SIGOPS 2010»
13 years 8 months ago
Storing and accessing live mashup content in the cloud
Today’s Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of repli...
Krzysztof Ostrowski, Ken Birman
WWW
2011
ACM
13 years 5 months ago
A word at a time: computing word relatedness using temporal semantic analysis
Computing the degree of semantic relatedness of words is a key functionality of many language applications such as search, clustering, and disambiguation. Previous approaches to c...
Kira Radinsky, Eugene Agichtein, Evgeniy Gabrilovi...