Sciweavers

1178 search results - page 130 / 236
» Modeling and analysis of content identification
Sort
View
ICSOC
2007
Springer
14 years 3 months ago
Architectural Decisions and Patterns for Transactional Workflows in SOA
Abstract. An important architectural style for constructing enterprise applications is to use transactional workflows in SOA. In this setting, workflow activities invoke distribute...
Olaf Zimmermann, Jonas Grundler, Stefan Tai, Frank...
ACSAC
2002
IEEE
14 years 2 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
IJSWIS
2008
108views more  IJSWIS 2008»
13 years 9 months ago
Identity of Resources and Entities on the Web
One of the main strengths of the web is that it allows any party of its global community to share information with any other party. This goal has been achieved by making use of a u...
Valentina Presutti, Aldo Gangemi
JCB
2008
170views more  JCB 2008»
13 years 9 months ago
Efficiently Identifying Max-Gap Clusters in Pairwise Genome Comparison
The spatial clustering of genes across different genomes has been used to study important problems in comparative genomics, from identification of operons to detection of homologo...
Xu Ling, Xin He, Dong Xin, Jiawei Han
ICDAR
1997
IEEE
14 years 1 months ago
The Function of Documents
The purpose of a document is to facilitate the transfer of information from its author to its readers. It is the author’s job to design the document so that the information it c...
David S. Doermann, Azriel Rosenfeld, Ehud Rivlin