Sciweavers

29147 search results - page 5697 / 5830
» System Modeling Resurrected
Sort
View
CORR
2004
Springer
120views Education» more  CORR 2004»
15 years 4 months ago
Validating a Web Service Security Abstraction by Typing
Abstraction by Typing Andrew D. Gordon Microsoft Research Riccardo Pucella Cornell University An XML web service is, to a first approximation, an RPC service in which requests and...
Andrew D. Gordon, Riccardo Pucella
AI
2000
Springer
15 years 4 months ago
Wrapper induction: Efficiency and expressiveness
The Internet presents numerous sources of useful information--telephone directories, product catalogs, stock quotes, event listings, etc. Recently, many systems have been built th...
Nicholas Kushmerick
CONCURRENCY
2000
123views more  CONCURRENCY 2000»
15 years 4 months ago
A mobile agent based push methodology for global parallel computing
The 1990s are seeing the explosive growth of the Internet and Web-based information sharing and dissemination systems. The Internet is also showing a potential of forming of a sup...
Cheng-Zhong Xu, Brian Wims
MOBICOM
2004
ACM
15 years 10 months ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
VCIP
2000
128views Communications» more  VCIP 2000»
15 years 5 months ago
Video Quality Experts Group: current results and future directions
Subjective assessment methods have been used reliably for many years to evaluate video quality. They continue to provide the most reliable assessments compared to objective method...
Ann M. Rohaly, Philip J. Corriveau, John M. Libert...
« Prev « First page 5697 / 5830 Last » Next »