Sciweavers

234 search results - page 45 / 47
» Evolving Messaging Systems for Secure Role Based Messaging
Sort
View
SCESM
2006
ACM
262views Algorithms» more  SCESM 2006»
14 years 1 months ago
Scenario-driven modeling and validation of requirements models
Requirements models for large systems typically cannot be developed in a single step, but evolve in a sequence of iterations. We have developed such an iterative modeling process ...
Christian Seybold, Silvio Meier, Martin Glinz
CIKM
2009
Springer
14 years 2 months ago
Using multiple ontologies in information extraction
Ontology-Based Information Extraction (OBIE) has recently emerged as a subfield of Information Extraction (IE). Here, ontologies - which provide formal and explicit specificatio...
Daya C. Wimalasuriya, Dejing Dou
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 2 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
ECRTS
2000
IEEE
14 years 4 days ago
Harmonious internal clock synchronization
Internal clock synchronization has been investigated, or employed, for quite a number of years, under the requirement of good upper bounds for the deviation, or accuracy, between ...
Horst F. Wedde, Wolfgang Freund
TIM
2011
123views more  TIM 2011»
13 years 2 months ago
A Distributed Measurement Scheme for Internet Latency Estimation
—Estimating latency between the hosts in the Internet can play a significant role in the improvement of the performance of many services that use latency among hosts to make rout...
Negar Hariri, Behnoosh Hariri, Shervin Shirmohamma...