Sciweavers

6618 search results - page 1298 / 1324
» Web Search Engines
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
DIMVA
2007
13 years 10 months ago
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms
Abstract. We present two light-weight worm detection algorithms that offer significant advantages over fixed-threshold methods. The first algorithm, RBS (ratebased sequential hy...
Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson
MKWI
2008
126views Business» more  MKWI 2008»
13 years 10 months ago
A Software Architecture for Grid Utilisation in Business Workflows
: Within an enterprise various information systems have to be run. Enterprise Application Integration (EAI) has become a well-established way to integrate such heterogeneous busine...
Stefan Gudenkauf, Wilhelm Hasselbring, Felix Heine...
MC
2007
149views Computer Science» more  MC 2007»
13 years 10 months ago
Embodied Media and Mixed Reality for Social and Physical Interactive Communication and Entertainment
This talk outlines new facilities within human media spaces supporting embodied interaction between humans, animals, and computation both socially and physically, with the aim of ...
Adrian David Cheok
SWAP
2008
13 years 10 months ago
A Note on the Evaluation of Inductive Concept Classification Procedures
Abstract. The limitations of deductive logic-based approaches at deriving operational knowledge from ontologies may be overcome by inductive (instancebased) methods, which are usua...
Claudia d'Amato, Nicola Fanizzi, Floriana Esposito
« Prev « First page 1298 / 1324 Last » Next »