Sciweavers

6010 search results - page 1050 / 1202
» Computational Approaches to Drug Design
Sort
View
ICWE
2004
Springer
14 years 2 months ago
Screen Readers Cannot See: Ontology Based Semantic Annotation for Visually Impaired Web Travellers
ct Travelling upon the Web is difficult for visually impaired users since the Web pages are designed for visual interaction [6]. Visually impaired users usually use screen readers...
Yeliz Yesilada, Simon Harper, Carole A. Goble, Rob...
IFIP
2004
Springer
14 years 2 months ago
Ad Hoc Routing with Early Unidirectionality Detection and Avoidance
This paper is motivated by the observation that current research in ad hoc networks mostly assumes a physically flat network architecture with the nodes having homogeneous charact...
Young-Bae Ko, Sung-Ju Lee, Jun-Beom Lee
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
14 years 2 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen
MIDDLEWARE
2004
Springer
14 years 2 months ago
Enabling collaborative adaptation across legacy components
Software frequently needs to adapt its behavior at run time to respond to changes in its execution environment. Different software components may use different approaches to adap...
Zhenxiao Yang, Zhinan Zhou, Betty H. C. Cheng, Phi...
POLICY
2004
Springer
14 years 2 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
« Prev « First page 1050 / 1202 Last » Next »