Sciweavers

5378 search results - page 1004 / 1076
» Base Logics in Argumentation
Sort
View
KSEM
2010
Springer
13 years 6 months ago
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Securi
Web 2.0 is much more than adding a nice facade to old web applications rather it is a new way of thinking about software architecture of Rich Internet Applications (RIA). In compar...
Amirreza Tahamtan, Amin Anjomshoaa, Edgar Weippl, ...
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 6 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
FORTE
2009
13 years 6 months ago
Keep It Small, Keep It Real: Efficient Run-Time Verification of Web Service Compositions
Abstract. Service compositions leverage remote services to deliver addedvalue distributed applications. Since services are administered and run by independent parties, the governan...
Luciano Baresi, Domenico Bianculli, Sam Guinea, Pa...
HCI
2009
13 years 6 months ago
Specifying the Representation of Non-geometric Information in 3D Virtual Environments
In 3D virtual environments (3DVE), we need to know what an object looks like (i.e. geometric information) and what the object is, what are its properties and characteristics and ho...
Kaveh Bazargan, Gilles Falquet
ICUMT
2009
13 years 6 months ago
Discovery of Physical Neighbors for P2P 3D streaming
Abstract-- Many peer-to-peer-based virtual environment (P2PVE) solutions have been proposed recently to improve the scalability of distributed virtual environment (VE) systems. By ...
Chang-Hua Wu, Shun-Yun Hu, Li-Ming Tseng
« Prev « First page 1004 / 1076 Last » Next »