Sciweavers

2717 search results - page 72 / 544
» Evaluation in Context
Sort
View
NDSS
2008
IEEE
14 years 4 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
CIKM
2007
Springer
14 years 4 months ago
Leveraging context in user-centric entity detection systems
A user-centric entity detection system is one in which the primary consumer of the detected entities is a person who can perform actions on the detected entities (e.g. perform a s...
Vadim von Brzeski, Utku Irmak, Reiner Kraft
SSDBM
2010
IEEE
308views Database» more  SSDBM 2010»
14 years 3 months ago
Provenance Context Entity (PaCE): Scalable Provenance Tracking for Scientific RDF Data
The Resource Description Framework (RDF) format is being used by a large number of scientific applications to store and disseminate their datasets. The provenance information, desc...
Satya Sanket Sahoo, Olivier Bodenreider, Pascal Hi...
ECEH
2007
98views Healthcare» more  ECEH 2007»
13 years 11 months ago
Integrating Context Information in a Mobile Environment using the eSana Framework
: Mobile devices are becoming ubiquitous in everyday’s life, their popularity and place independence are reasons for using these devices in different areas. One such area is elec...
Marco Savini, Henrik Stormer, Andreas Meier
JKM
2010
131views more  JKM 2010»
13 years 8 months ago
Beyond the ba: managing enabling contexts in knowledge organizations
Purpose – Looking at the practical experience of organizations pursuing knowledge management, it is found that their efforts are primarily focused on creating the conditions and...
Chun Wei Choo, Rivadávia Correa Drummond de...