Sciweavers

2474 search results - page 373 / 495
» Using Knowledge Management Systems to Structure Knowledgeabl...
Sort
View
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
15 years 8 months ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
MIDDLEWARE
2007
Springer
15 years 8 months ago
Combining ontology queries with key word search in the GloServ service discovery system
GloServ is a global service discovery system which aggregates different types of services in a globally distributed network. It improves on current service discovery systems by sc...
Knarig Arabshian, Henning Schulzrinne
ICSE
1999
IEEE-ACM
15 years 6 months ago
Exploiting Smalltalk Modules in a Customizable Programming Environment
This paper describes how we have extended a module structure of the Smalltalk LearningWorks to provide a programming environment deigned for very large scale technology transfer. ...
Mark Woodman, Robert Griffiths, Malcolm Macgregor,...
ICML
2003
IEEE
16 years 3 months ago
Exploration and Exploitation in Adaptive Filtering Based on Bayesian Active Learning
In the task of adaptive information filtering, a system receives a stream of documents but delivers only those that match a person's information need. As the system filters i...
Yi Zhang, Wei Xu, James P. Callan
IUI
2006
ACM
15 years 8 months ago
Activity-oriented context-aware adaptation assisting mobile geo-spatial activities
Human geospatial activities often involves the use of geographic information in mobile environment where the context of technology use is dynamic, complex, and unstable, creating ...
Guoray Cai, Yinkun Xue