Sciweavers

2316 search results - page 121 / 464
» How Asymmetric Is the Internet
Sort
View
SEMWEB
2005
Springer
15 years 9 months ago
A Little Semantic Web Goes a Long Way in Biology
We show how state-of-the-art Semantic Web technology can be used in e-Science, in particular to automate the classification of proteins in biology. We show that the resulting clas...
Katy Wolstencroft, Andy Brass, Ian Horrocks, Phill...
AH
2004
Springer
15 years 9 months ago
Context-Aware Recommendations in the Mobile Tourist Application COMPASS
This paper describes the context-aware mobile tourist application COMPASS that adapts its services to the user’s needs based on both the user’s interests and his current contex...
Mark van Setten, Stanislav Pokraev, Johan Koolwaai...
WORDS
2003
IEEE
15 years 9 months ago
Practical Aspects of IP Take-Over Mechanisms
Transparent replication has been viewed as the holy grail of fault-tolerant computing. We discuss issues arising when using atomic broadcast to replicate services that are accesse...
Christof Fetzer, Neeraj Suri
FTDCS
1997
IEEE
15 years 8 months ago
Intrusion ripple analysis in distributed information systems
: Security is a very important aspect of distributed computing systems, especially in distributed information environments involving widearea networks, such as internets. In this p...
S. S. Yau, Jun Zhu
FC
2008
Springer
102views Cryptology» more  FC 2008»
15 years 6 months ago
Identity Theft: Much Too Easy? A Study of Online Systems in Norway
Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal ...
André N. Klingsheim, Kjell Jørgen Ho...