Sciweavers

15251 search results - page 2857 / 3051
» Network Science - Theory and Application
Sort
View
ISSA
2004
13 years 10 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
ISTA
2004
13 years 10 months ago
Evidential Paradigm and Intelligent Mathematical Text Processing
Abstract: This paper presents the evidential paradigm of computer-supported mathematical assistance in "doing" mathematics and in reasoning activity. At present, the evid...
Alexander V. Lyaletski, Anatoly E. Doroshenko, And...
JBI
2004
163views Bioinformatics» more  JBI 2004»
13 years 10 months ago
Artificial Chemistries and Metabolic Pathways
Metabolism can be regarded as a network of biochemical reactions, connected via their substrates and products. A metabolic pathway is thus a coordinated series of reactions, and i...
Liliana Félix, Francesc Rosselló, Ga...
ECIS
2003
13 years 10 months ago
From e-business to knowledge e-trading
This paper aims to show investigations made in knowledge e-marketplaces (Ke-markets). It gathers, reviews, structures, and compiles in a homogeneous presentation information of th...
Emanuela Pauselli
LISA
2001
13 years 10 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
« Prev « First page 2857 / 3051 Last » Next »