Sciweavers

1025 search results - page 130 / 205
» The Meaning of the Web
Sort
View
ISADS
1999
IEEE
14 years 8 days ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
LREC
2010
144views Education» more  LREC 2010»
13 years 9 months ago
Towards an Improved Methodology for Automated Readability Prediction
Since the first half of the 20th century, readability formulas have been widely employed to automatically predict the readability of an unseen text. In this article, the formulas ...
Philip van Oosten, Dries Tanghe, Véronique ...
SEBD
2007
101views Database» more  SEBD 2007»
13 years 9 months ago
Service Matching and Discovery in P2P Semantic Community
Abstract. Recently, more and more web services are being made available and their use can potentially highly increase cooperation in P2P systems, where different partners intend t...
Devis Bianchini, Valeria De Antonellis, Michele Me...
FMOODS
2006
13 years 9 months ago
Mobility Mechanisms in Service Oriented Computing
Abstract. The usual context of service oriented computing is characterized by several services offering the same functionalities, new services that are continuosly deployed and oth...
Claudio Guidi, Roberto Lucchi
MASCOTS
2004
13 years 9 months ago
Size-Based Scheduling Policies with Inaccurate Scheduling Information
Size-based scheduling policies such as SRPT have been studied since 1960s and have been applied in various arenas including packet networks and web server scheduling. SRPT has bee...
Dong Lu, Huanyuan Sheng, Peter A. Dinda