Sciweavers

495 search results - page 38 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
EUROPAR
2001
Springer
14 years 6 days ago
Use of Agent-Based Service Discovery for Resource Management in Metacomputing Environment
A new methodology is presented in this paper for resource management in a metacomputing environment using a hierarchy of homogeneous agents that has the capability of service disco...
Junwei Cao, Darren J. Kerbyson, Graham R. Nudd
IIWAS
2007
13 years 9 months ago
Sub-Ontology Discovery for Adaptive Re-use
: The discovery of the ”right” ontology or ontology part is a central ingredient for effective ontology re-use. We present an approach for supporting a form of adaptive re-use...
Rodolfo Stecher, Claudia Niederée, Wolfgang...
DAGM
2006
Springer
13 years 11 months ago
Towards Unsupervised Discovery of Visual Categories
Recently, many approaches have been proposed for visual object category detection. They vary greatly in terms of how much supervision is needed. High performance object detection m...
Mario Fritz, Bernt Schiele
ICWS
2004
IEEE
13 years 9 months ago
Transforming BPEL into Annotated Deterministic Finite State Automata for Service Discovery
Web services advocate loosely coupled systems, although current loosely coupled applications are limited to stateless services. The reason for this limitation is the lack of a met...
Andreas Wombacher, Peter Fankhauser, Erich J. Neuh...
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
12 years 11 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...