Sciweavers

1615 search results - page 250 / 323
» Evaluation of current architecture frameworks
Sort
View
JHSN
2006
95views more  JHSN 2006»
13 years 8 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
PERCOM
2008
ACM
13 years 8 months ago
CASD: Management of a context-aware service directory
Traditional web service discovery is strongly related to the use of service directories. Especially in the case of mobile web services, where both service requestors and providers...
Christos Doulkeridis, Michalis Vazirgiannis
ACL
2010
13 years 7 months ago
Towards Robust Multi-Tool Tagging. An OWL/DL-Based Approach
This paper describes a series of experiments to test the hypothesis that the parallel application of multiple NLP tools and the integration of their results improves the correctne...
Christian Chiarcos
ESSLLI
2009
Springer
13 years 6 months ago
A Salience-Driven Approach to Speech Recognition for Human-Robot Interaction
We present an implemented model for speech recognition in natural environments which relies on contextual information about salient entities to prime utterance recognition. The hyp...
Pierre Lison
ICNS
2009
IEEE
13 years 6 months ago
Cost-Effective Burst-Over-Circuit-Switching in a Hybrid Optical Network
All optical switching has been proposed as a candidate to allow high capacity networking in the future. Currently, Optical Circuit Switching has been widely deployed, although thi...
Jens Buysse, Marc De Leenheer, Chris Develder, Bar...