Sciweavers

610 search results - page 118 / 122
» Generating Research Websites Using Summarisation Techniques
Sort
View
ICDM
2008
IEEE
235views Data Mining» more  ICDM 2008»
14 years 1 months ago
DECK: Detecting Events from Web Click-Through Data
In the past few years there has been increased research interest in detecting previously unidentified events from Web resources. Our focus in this paper is to detect events from ...
Ling Chen 0002, Yiqun Hu, Wolfgang Nejdl
NDSS
2008
IEEE
14 years 1 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ANSS
2007
IEEE
14 years 1 months ago
Vehicular Mobility Simulation for VANETs
During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity ...
Marco Fiore, Jérôme Härri, Fethi...
WECWIS
2007
IEEE
172views ECommerce» more  WECWIS 2007»
14 years 1 months ago
An Analysis Tool for Execution of BPEL Services
Business Process Execution Language (BPEL) is an XML-based language for specifying services. There have been numerous recent research and development efforts in both statically an...
Ariane Gravel, Xiang Fu, Jianwen Su
SASN
2005
ACM
14 years 29 days ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava