Sciweavers

2557 search results - page 283 / 512
» Real scaled matching
Sort
View
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
15 years 11 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
AUSAI
2009
Springer
15 years 11 months ago
A Graph Distance Based Structural Clustering Approach for Networks
In the era of information explosion, structured data emerge on a large scale. As a description of structured data, network has drawn attention of researchers in many subjects. Netw...
Xin Su, Chunping Li
BRAIN
2009
Springer
15 years 11 months ago
Data Explosion, Data Nature and Dataology
The essence of computer applications is to store things in the real world into computer systems in the form of data, i.e., it is a process of producing data. Some data are the reco...
Yangyong Zhu, Ning Zhong, Yun Xiong
ESWS
2009
Springer
15 years 11 months ago
Ontology Libraries for Production Use: The Finnish Ontology Library Service ONKI
Abstract. This paper discusses problems of creating and using ontology library services in production use. One approach to a solution is presented with an online implementation—t...
Kim Viljanen, Jouni Tuominen, Eero Hyvönen
ICSOC
2009
Springer
15 years 11 months ago
Another Approach to Service Instance Migration
Services change over time, be it for internal improvements, be it for external requirements such as new legal regulations. For long running services, it may even be necessary to ch...
Nannette Liske, Niels Lohmann, Christian Stahl, Ka...