Sciweavers

601 search results - page 118 / 121
» Argumentation support: from technologies to tools
Sort
View
IWIA
2005
IEEE
14 years 28 days ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
EMISA
2004
Springer
14 years 22 days ago
eSarine - A Struts-based Webshop for Small and Medium-sized Enterprises
: Electronic commerce becomes an important competitive advantage for small and medium-sized enterprises. Those enterprises therefore need a tool to easily exhibit and sell their pr...
Nicolas Werro, Henrik Stormer, Daniel Frauchiger, ...
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
13 years 11 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
ECOOPW
2006
Springer
13 years 11 months ago
AOSD and Reflection: Benefits and Drawbacks to Software Evolution
Following last two years' RAM-SE (Reflection, AOP and Meta-Data for Software Evolution) workshop at the ECOOP conference, the RAM-SE 2006 workshop was a successful and popular...
Walter Cazzola, Shigeru Chiba, Yvonne Coady, Gunte...
ERCIMDL
2006
Springer
234views Education» more  ERCIMDL 2006»
13 years 11 months ago
Intelligent Bibliography Creation and Markup for Authors: A Step Towards Interoperable Digital Libraries
The move towards integrated international Digital Libraries offers the opportunity of creating comprehensive data on citation networks. These data are not only invaluable pointers ...
Bettina Berendt, Kai Dingel, Christoph Hanser