Sciweavers

762 search results - page 82 / 153
» How to realize
Sort
View
ACSAC
2010
IEEE
15 years 2 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
IUI
2011
ACM
14 years 6 months ago
TellMe: learning procedures from tutorial instruction
This paper describes an approach to allow end users to define new procedures through tutorial instruction. Our approach allows users to specify procedures in natural language in t...
Yolanda Gil, Varun Ratnakar, Christian Fritz
AAAIDEA
2005
IEEE
15 years 9 months ago
Design and Evaluation of Diffserv Functionalities in the MPLS Edge Router Architecture
—Differentiated Service (DiffServ) in combination with Multi-Protocol Label Switching (MPLS) is a promising technology in converting the best-effort Internet into a QoS-capable n...
Wei-Chu Lai, Kuo-Ching Wu, Ting-Chao Hou
LREC
2010
196views Education» more  LREC 2010»
15 years 5 months ago
Event Models for Historical Perspectives: Determining Relations between High and Low Level Events in Text, Based on the Classifi
In this paper, we report on a study that was performed within the "Semantics of History" project on how descriptions of historical events are realized in different types...
Agata Cybulska, Piek Vossen
MKWI
2008
160views Business» more  MKWI 2008»
15 years 5 months ago
Architectural Design of Flexible Process Management Technology
: To provide effective support, process-aware information systems (PAIS) must not freeze existing business processes. Instead they should enable authorized users to deviate on-the-...
Manfred Reichert, Peter Dadam, Martin Jurisch, Ulr...