Sciweavers

3343 search results - page 635 / 669
» Network Objects
Sort
View
IJWIS
2007
153views more  IJWIS 2007»
13 years 9 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
WS
2008
ACM
13 years 9 months ago
ActiveRDF: Embedding Semantic Web data into object-oriented languages
Semantic Web applications share a large portion of development effort with database-driven Web applications. Existing approaches for development of these database-driven applicati...
Eyal Oren, Benjamin Heitmann, Stefan Decker
CACM
1998
127views more  CACM 1998»
13 years 9 months ago
The Virtual Reality Modeling Language and Java
Abstract. The Virtual Reality Modeling Language (VRML) and Java provide a standardized, portable and platformindependent way to render dynamic, interactive 3D scenes across the Int...
Donald P. Brutzman
CONSTRAINTS
1998
127views more  CONSTRAINTS 1998»
13 years 9 months ago
Experimental Analysis of Numeric and Symbolic Constraint Satisfaction Techniques for Temporal Reasoning
Many temporal applications like planning and scheduling can be viewed as special cases of the numeric and symbolic temporal constraint satisfaction problem. Thus we have developed ...
Malek Mouhoub, François Charpillet, Jean Pa...
NN
1998
Springer
177views Neural Networks» more  NN 1998»
13 years 9 months ago
Soft vector quantization and the EM algorithm
The relation between hard c-means (HCM), fuzzy c-means (FCM), fuzzy learning vector quantization (FLVQ), soft competition scheme (SCS) of Yair et al. (1992) and probabilistic Gaus...
Ethem Alpaydin