Sciweavers

15251 search results - page 2857 / 3051
» Network Science - Theory and Application
Sort
View
ISSA
2004
15 years 5 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
ISTA
2004
15 years 5 months ago
Evidential Paradigm and Intelligent Mathematical Text Processing
Abstract: This paper presents the evidential paradigm of computer-supported mathematical assistance in "doing" mathematics and in reasoning activity. At present, the evid...
Alexander V. Lyaletski, Anatoly E. Doroshenko, And...
JBI
2004
163views Bioinformatics» more  JBI 2004»
15 years 5 months ago
Artificial Chemistries and Metabolic Pathways
Metabolism can be regarded as a network of biochemical reactions, connected via their substrates and products. A metabolic pathway is thus a coordinated series of reactions, and i...
Liliana Félix, Francesc Rosselló, Ga...
110
Voted
ECIS
2003
15 years 5 months ago
From e-business to knowledge e-trading
This paper aims to show investigations made in knowledge e-marketplaces (Ke-markets). It gathers, reviews, structures, and compiles in a homogeneous presentation information of th...
Emanuela Pauselli
LISA
2001
15 years 5 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
« Prev « First page 2857 / 3051 Last » Next »