Sciweavers

6167 search results - page 1034 / 1234
» Can Refinement be Automated
Sort
View
ECAI
2008
Springer
14 years 4 days ago
Optimizing Causal Link Based Web Service Composition
Automation of Web service composition is one of the most interesting challenges facing the Semantic Web today. Since Web services have been enhanced with formal semantic descriptio...
Freddy Lécué, Alexandre Delteil, Ala...
EGOV
2008
Springer
14 years 4 days ago
Paving the Way to eGovernment Transformation: Interoperability Registry Infrastructure Development
During the last decades eGovernment has been a vivid, dynamic research and development area. As services are being transformed, electronic documents and web services appear every d...
Aikaterini-Maria Sourouni, Fenareti Lampathaki, Sp...
ICDAR
2007
IEEE
14 years 4 days ago
Example-Based Logical Labeling of Document Title Page Images
This paper presents a flexible and effective examplebased approach for labeling title pages which can be used for automated extraction of bibliographic data. The labels of intere...
Joost van Beusekom, Daniel Keysers, Faisal Shafait...
EUROPAR
2008
Springer
14 years 4 days ago
DGSim: Comparing Grid Resource Management Architectures through Trace-Based Simulation
Abstract. Many advances in grid resource management are still required to realize the grid computing vision of the integration of a worldwide computing infrastructure for scientifi...
Alexandru Iosup, Omer Ozan Sonmez, Dick H. J. Epem...
DIMVA
2010
13 years 12 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
« Prev « First page 1034 / 1234 Last » Next »