Sciweavers

RIVF
2008
13 years 9 months ago
Unsupervised learning for image classification based on distribution of hierarchical feature tree
The classification image into one of several categories is a problem arisen naturally under a wide range of circumstances. In this paper, we present a novel unsupervised model for ...
Thach-Thao Duong, Joo-Hwee Lim, Hai-Quan Vu, Jean-...
RIVF
2008
13 years 9 months ago
Simple but effective methods for combining kernels in computational biology
Complex biological data generated from various experiments are stored in diverse data types in multiple datasets. By appropriately representing each biological dataset as a kernel ...
Hiroaki Tanabe, Tu Bao Ho, Canh Hao Nguyen, Saori ...
RIVF
2008
13 years 9 months ago
Robust overlay network with Self-Adaptive topology: Protocol description
We introduce a new overlay network named ROSA1 . Overlay networks offer a way to bypass the routing constraints of the underlying network. ROSA used this overlay network property t...
Loic Baud, Nguyen Pham, Patrick Bellot
IIWAS
2007
13 years 9 months ago
User Data Privacy in Web Services Context Using Semantic Desktop - SemanticLIFE Case Study
The growing number of Web Services technologies and their use have revolutionized the web. Web Services will play an important role in the next web generation (i.e. Semantic Web) ...
Mansoor Ahmed, Amin Andjomshoaa, A. Min Tjoa
IIWAS
2007
13 years 9 months ago
Implementing Semantic Interoperability in Electronic Auctions
Electronic marketplaces can provide several types of business processes depending upon their target audience. A form of such processes is electronic auction. It is a system for ac...
Juha Puustjärvi
IIWAS
2007
13 years 9 months ago
Engineering Communities of Web Services
This paper presents an approach that provides the necessary assistance to those who are in charge of engineering communities of Web services. Current practices indicate that Web se...
Sattanathan Subramanian, Philippe Thiran, Zakaria ...
IIWAS
2007
13 years 9 months ago
An Extensible Framework for Database Security Assessment and Visualization
By using database security metrics to evaluate how risky the current database environment is and visually displaying the metric results on graphs, database security visualization ...
Tran Khanh Dang, Thieu Hoa Le, Duy Tin Truong
IIWAS
2007
13 years 9 months ago
Security aspects in Semantic Web Services Filtering
Security and trust aspects, perceived as difficult to quantify, have been neglected in various service interactions. However, factors related to security and trust are in fact cru...
Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, ...
IIWAS
2007
13 years 9 months ago
Sub-Ontology Discovery for Adaptive Re-use
: The discovery of the ”right” ontology or ontology part is a central ingredient for effective ontology re-use. We present an approach for supporting a form of adaptive re-use...
Rodolfo Stecher, Claudia Niederée, Wolfgang...
ICWS
2007
IEEE
13 years 9 months ago
Research on Service-Oriented Workflow and Performance Evaluation
The advent of SOA and Grid technology has brought new challenges to workflow operation and performance evaluation. In this paper, the characteristics of service-oriented workflow ...
Bo Liu, Yushun Fan