Sciweavers

1266 search results - page 181 / 254
» An Overview of Repository Technology
Sort
View
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
SEMWEB
2009
Springer
14 years 2 months ago
ASMOV: Results for OAEI 2009
The Automated Semantic Mapping of Ontologies with Validation (ASMOV) algorithm for ontology alignment was one of the top performing algorithms in the 2007 and 2008 Ontology Alignme...
Yves R. Jean-Mary, E. Patrick Shironoshita, Mansur...
SLIP
2009
ACM
14 years 2 months ago
Prediction of high-performance on-chip global interconnection
Different interconnection structures have been proposed to solve the performance limitation caused by scaling of on-chip global wires. In this paper, we give an overview of curre...
Yulei Zhang, Xiang Hu, Alina Deutsch, A. Ege Engin...
WIKIS
2009
ACM
14 years 2 months ago
3DWiki: the 3D Wiki engine
We demonstrate one of the potential paths of the evolution of wiki engines towards Web 3.0. We introduce 3dWiki - the 3D wiki engine, which was built according to 2-Layer Interfac...
Jacek Jankowski, Marek Jozwowicz, Yolanda Cobos, B...
IEEEIAS
2008
IEEE
14 years 2 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina