Sciweavers

1266 search results - page 137 / 254
» An Overview of Repository Technology
Sort
View
TES
2001
Springer
14 years 10 days ago
Peer-to-Peer Traced Execution of Composite Services
Abstract. The connectivity generated by the Internet is opening unprecedented opportunities of automating business-to-business collaborations. As a result, organisations of all siz...
Marie-Christine Fauvet, Marlon Dumas, Boualem Bena...
WIDM
1999
ACM
14 years 6 days ago
An Efficient Plan Execution System for Information Management Agents
Recent work on information integration has yielded novel and efficient solutions for gathering data from the World Wide Web. However, there has been little attention given to the ...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...
VRML
2010
ACM
13 years 11 months ago
SpiderGL: a JavaScript 3D graphics library for next-generation WWW
Thanks to the WebGL graphics API specification for the JavaScript programming language, the possibility of using the GPU capabilities in a web browser without the need for an ad-...
Marco Di Benedetto, Federico Ponchio, Fabio Ganove...
AWIC
2004
Springer
13 years 11 months ago
Attribute Reduction for Effective Intrusion Detection
Abstract. Computer intrusion detection is to do with identifying computer activities that may compromise the integrity, confidentiality or the availability of an IT system. Anomaly...
Fernando Godínez, Dieter Hutter, Raul Monro...
CSWWS
2006
13 years 11 months ago
Fulfilling the Needs of a Metadata Creator and Analyst- An Investigation of RDF Browsing and Visualization Tools
The realization of Semantic Web vision is based on the creation and use of semantic web content which needs software tools both for semantic web developers and end users. Over the ...
Shah Kushro, A. Min Tjoa