Sciweavers

7158 search results - page 1327 / 1432
» Anatomy of data integration
Sort
View
BTW
2003
Springer
129views Database» more  BTW 2003»
15 years 9 months ago
Type Checking in XOBE
: XML is the upcoming standard for internet data. Java is the most important programming language for internet applications. Nevertheless, in today’s languages and tools there is...
Martin Kempa, Volker Linnemann
GECCO
2003
Springer
123views Optimization» more  GECCO 2003»
15 years 9 months ago
Benefits of Implicit Redundant Genetic Algorithms for Structural Damage Detection in Noisy Environments
A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problem...
Anne M. Raich, Tamás Liszkai
ACSAC
2002
IEEE
15 years 9 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
ACSAC
2000
IEEE
15 years 8 months ago
Applications in Health Care using Public-Key Certificates and Attribute Certificates
Security infrastructures are increasingly used in the health care and welfare sector, particularly for providing security, like confidentiality, authenticity, integrity, nonrepudi...
Petra Wohlmacher, Peter Pharow
SIGCSE
2000
ACM
132views Education» more  SIGCSE 2000»
15 years 8 months ago
Empirical investigation throughout the CS curriculum
Empirical skills are playing an increasingly important role in the computing profession and our society. But while traditional computer science curricula are effective in teaching...
David W. Reed, Craig S. Miller, Grant Braught
« Prev « First page 1327 / 1432 Last » Next »