Sciweavers

425 search results - page 77 / 85
» Creating Shared Knowledge: Instructional Knowledge Managemen...
Sort
View
SIS
2008
13 years 9 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
ACSW
2006
13 years 9 months ago
Toward building grid applications in bioinformatics
In silico bioinformatics experiments involve integration of and access to computational tools and biological databases. The emerging grid computing technologies enable bioinformat...
Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro ...
COOPIS
2003
IEEE
14 years 28 days ago
Automatic Expansion of Manual Email Classifications Based on Text Analysis
The organization of documents is a task that we face as computer users daily. This is particularly true for management of email. Typically email documents are organized in director...
Enrico Giacoletto, Karl Aberer
IDA
2010
Springer
13 years 11 months ago
Deterministic Finite Automata in the Detection of EEG Spikes and Seizures
This Paper presents a platform to mine epileptiform activity from Electroencephalograms (EEG) by combining the methodologies of Deterministic Finite Automata (DFA) and Knowledge Di...
Rory A. Lewis, Doron Shmueli, Andrew M. White
FTDCS
2004
IEEE
13 years 11 months ago
A New Perspective in Defending against DDoS
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale...
Shigang Chen, Randy Chow