Sciweavers

12946 search results - page 2564 / 2590
» Natural Language Processing
Sort
View
ACSAC
2002
IEEE
14 years 3 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
COMPSAC
2002
IEEE
14 years 3 months ago
An Approach to Identify Duplicated Web Pages
A relevant consequence of the unceasing expansion of the Web and e-commerce is the growth of the demand of new Web sites and Web applications. The software industry is facing the ...
Giuseppe A. Di Lucca, Massimiliano Di Penta, Anna ...
COOPIS
2002
IEEE
14 years 3 months ago
Design and Performance of Asynchronous Method Handling for CORBA
This paper describes the design and performance of a new asynchronous method handling (AMH) mechanism that allows CORBA servers to process client requests asynchronously. AMH deco...
Mayur Deshpande, Douglas C. Schmidt, Carlos O'Ryan...
GLVLSI
2002
IEEE
108views VLSI» more  GLVLSI 2002»
14 years 3 months ago
Protected IP-core test generation
Design simplification is becoming necessary to respect the target time-to-market of SoCs, and this goal can be obtained by using predesigned IP-cores. However, their correct inte...
Alessandro Fin, Franco Fummi
WECWIS
2002
IEEE
136views ECommerce» more  WECWIS 2002»
14 years 3 months ago
XML-based Advanced UDDI Search Mechanism for B2B Integration
Exploring an appropriate business application published as a Web Service in the UDDI registry is a critical issue. Search for such an application should be effective in terms of t...
Liang-Jie Zhang, Haifei Li, Henry Chang, Tian Chao
« Prev « First page 2564 / 2590 Last » Next »