Sciweavers

2261 search results - page 434 / 453
» Dynamic types for authentication
Sort
View
WICON
2008
13 years 10 months ago
Towards distributed network classification for mobile ad hoc networks
Mobile ad hoc networks range from traditional MANETs where end-to-end paths exist from sources to destinations, to DTNs where no contemporaneous end-to-end paths exist and communi...
Dimitrios Antonellis, Ahmed Mansy, Konstantinos Ps...
EUMAS
2006
13 years 10 months ago
Agents Arguing over Ontology Alignments
ed Abstract Ontologies play an important role in inter-agent communication, by providing the definitions of the vocabularies used by agents to describe the world [4]. An agent can ...
Loredana Laera, Valentina A. M. Tamma, Jér&...
CASCON
2003
116views Education» more  CASCON 2003»
13 years 10 months ago
Workload characterization for an E-commerce web site
Electronic commerce servers have a significant presence in today’s Internet. Corporations require good performance for their business processes. To date, little empirical evide...
Qing Wang, Dwight J. Makaroff, H. Keith Edwards, R...
NDQA
2003
156views Education» more  NDQA 2003»
13 years 10 months ago
Toward a Question Answering Roadmap
Growth in government investment, academic research, and commercial question answering (QA) systems is motivating a need for increased planning and coordination. The internationali...
Mark T. Maybury
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 10 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt