Sciweavers

1739 search results - page 260 / 348
» Service Morphing: Integrated System- and Application-Level S...
Sort
View
APVIS
2007
15 years 5 months ago
Visualization of sanitized email logs for spam analysis
Email has become an integral method of communication. However, it is still plagued by vast amounts of spam. Many statistical techniques, such as Bayesian filtering, have been app...
Chris Muelder, Kwan-Liu Ma
IJMSO
2007
104views more  IJMSO 2007»
15 years 3 months ago
Bringing taxonomic structure to large digital libraries
: Digital libraries are invaluable repositories of information. However, in many situations, their size makes it difficult to access the desired resource. In this paper, we present...
David Sánchez, Antonio Moreno
ADB
1994
311views Database» more  ADB 1994»
15 years 8 months ago
A Personal and Portable Database Server: the CQL Card
Database applications and technologies are of central importance in many information systems a person may encounter. To obtain services, the end-users are required a smart card (pl...
Pierre Paradinas, Jean-Jacques Vandewalle
JAVA
2001
Springer
15 years 8 months ago
A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system’s design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks, e...
Peter R. Cappello, Dimitros Mourloukos
EEE
2004
IEEE
15 years 7 months ago
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective
e-Transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that int...
William Kwok-Wai Cheung