Sciweavers

300 search results - page 47 / 60
» Enterprise Security: A Community of Interest Based Approach
Sort
View
BMCBI
2004
144views more  BMCBI 2004»
13 years 7 months ago
PASBio: predicate-argument structures for event extraction in molecular biology
Background: The exploitation of information extraction (IE), a technology aiming to provide instances of structured representations from free-form text, has been rapidly growing w...
Tuangthong Wattarujeekrit, Parantu K. Shah, Nigel ...
AP2PC
2003
Springer
14 years 22 days ago
Mobile Agents for Locating Documents in Ad Hoc Networks
The wide availability of mobile devices equipped with wireless communication capabilities together with the technical possibility to form adhoc networks paves the way for building ...
Khaled Nagi, Iman Elghandour, Birgitta König-...
ICMS
2010
13 years 6 months ago
The Design of Core 2: A Library for Exact Numeric Computation in Geometry and Algebra
There is a growing interest in numeric-algebraic techniques in the computer algebra community as such techniques can speed up many applications. This paper is concerned with one su...
Jihun Yu, Chee Yap, Zilin Du, Sylvain Pion, Herv&e...
GI
2009
Springer
13 years 5 months ago
Visual Twittering Using Mobile Phones in Pervasive Environments
Abstract: Research in the field of academic teaching and life focuses on the integration of recent technologies. Additionally, new trends within the current usage of e.g. the Inter...
Michael Wittke, Sven Tomforde, Yaser Chaaban, J&uu...
SRDS
2008
IEEE
14 years 1 months ago
Systematic Structural Testing of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. As the quality of protection provided by a firewall dire...
JeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu