Sciweavers

1009 search results - page 152 / 202
» Work with Knowledge on the Internet - Local Search
Sort
View
IWIA
2006
IEEE
14 years 2 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
INFOCOM
2005
IEEE
14 years 1 months ago
Farsighted users harness network time-diversity
Abstract— Fluctuations in network conditions are a common phenomenon. They arise in the current wired Internet due to changes in demand, and in wireless networks due to changing ...
Peter B. Key, Laurent Massoulié, Milan Vojn...
HT
2005
ACM
14 years 1 months ago
The evolving mSpace platform: leveraging the semantic web on the trail of the memex
Vannevar Bush proposed the memex as a means to support building knowledge in the way he says the human brain works: by association. Achieving this vision has been a core motivatio...
Monica M. C. Schraefel, Daniel A. Smith, Alisdair ...
HT
2005
ACM
14 years 1 months ago
What is the space for?: the role of space in authoring hypertext representations
This paper describes our approach of using spatial hypertext as a means separated from an end representation for hypertext authoring. By taking advantage of the power of rich inte...
Yasuhiro Yamamoto, Kumiyo Nakakoji, Yoshiyuki Nish...
SEMWEB
2005
Springer
14 years 1 months ago
Web Service Composition with Volatile Information
In many Web service composition problems, information may be needed from Web services during the composition process. Existing research on Web service composition (WSC) procedures...
Tsz-Chiu Au, Ugur Kuter, Dana S. Nau