Sciweavers

144 search results - page 20 / 29
» Cobalt: Separating Content Distribution from Authorization i...
Sort
View
HOTI
2005
IEEE
14 years 1 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
ICDCS
1998
IEEE
13 years 12 months ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu
LREC
2010
236views Education» more  LREC 2010»
13 years 9 months ago
ProPOSEC: A Prosody and PoS Annotated Spoken English Corpus
We have previously reported on ProPOSEL, a purpose-built Prosody and PoS English Lexicon compatible with the Python Natural Language ToolKit. ProPOSEC is a new corpus research res...
Claire Brierley, Eric Atwell
ICDCSW
2003
IEEE
14 years 28 days ago
Entry Points into a Smart Campus Environment - Overview of the ETHOC System
The university campus is an interesting application environment for the ubiquitous computing paradigm: a large number of users share a substantial amount of their information need...
Michael Rohs, Jürgen Bohn
WWW
2003
ACM
14 years 8 months ago
Evolving the Semantic Web with Mangrove
Despite numerous proposals for its creation, the semantic web has yet to achieve widespread adoption. Recently, some researchers have argued that participation in the semantic web...
Luke McDowell, Oren Etzioni, Steven D. Gribble, Al...