Sciweavers

1625 search results - page 215 / 325
» Intentionality
Sort
View
COOPIS
2003
IEEE
14 years 4 months ago
Ontology Based Query Processing in Database Management Systems
The use of semantic knowledge in its various forms has become an important aspect in managing data in database and information systems. In the form of integrity constraints, it ha...
Chokri Ben Necib, Johann Christoph Freytag
CSFW
2003
IEEE
14 years 4 months ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann
LCN
2003
IEEE
14 years 4 months ago
A Performance Study of Fast Handovers for Mobile IPv6
We conducted a simulative evaluation of the overall performance of Fast Handovers for Mobile IPv6 in comparison with the baseline Mobile IPv6 using the network simulator ns-2 for ...
Marc Torrent-Moreno, Xavier Pérez Costa, Se...
RTCSA
2003
IEEE
14 years 4 months ago
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System
Abstract. This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authent...
Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuk...
ITICSE
2003
ACM
14 years 4 months ago
HTTPExplorer: exploring the hypertext transfer protocol
This paper presents HTTPExplorer, an interactive tool to explore the Hypertext Transfer Protocol. The intention is to use the tool in a course on web-based applications to support...
Volker Turau