Sciweavers

328 search results - page 53 / 66
» Identity-Enriched Session Management
Sort
View
ISW
2000
Springer
13 years 11 months ago
Performance Analysis of Secure Web Server Based on SSL
Abstract. In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (...
Xiaodong Lin, Johnny W. Wong, Weidong Kou
CIKM
2008
Springer
13 years 9 months ago
Search-based query suggestion
In this paper, we proposed a unified strategy to combine query log and search results for query suggestion. In this way, we leverage both the users' search intentions for pop...
Jiang-Ming Yang, Rui Cai, Feng Jing, Shuo Wang, Le...
EDM
2010
128views Data Mining» more  EDM 2010»
13 years 9 months ago
Using Educational Data Mining Methods to Study the Impact of Virtual Classroom in E-Learning
In the past few years, Iranian universities have embarked to use e-learning tools and technologies to extend and improve their educational services. After a few years of conducting...
Mohammad Hassan Falakmasir, Jafar Habibi
WICSA
2008
13 years 9 months ago
Wishes and Boundaries for a Software Architecture Knowledge Community
Software architecting is a highly knowledge-intensive process demanding and producing a large and rich amount of information. To remain competitive, companies and organizations wo...
Patricia Lago, Paris Avgeriou, Rafael Capilla, Phi...
CGVR
2006
13 years 9 months ago
Evolutionary Design of Virtual Plants
- This paper presents a technique of evolutionary design for plants in virtual worlds, inspired from Richard Dawkins' adaptive walks within the space of biomorph structures. T...
Stefan Bornhofen, Claude Lattaud