Sciweavers

23 search results - page 2 / 5
» isict 2003
Sort
View
ISICT
2003
13 years 6 months ago
The influence of semantics in IR using LSI and K-means clustering techniques
In this paper we study the influence of semantics in the information retrieval preprocessing. We concretely compare the reached performance with stemming and semantic lemmatizatio...
Daniel Jiménez, Edgardo Ferretti, Vicente V...
ISICT
2003
13 years 6 months ago
Supporting complexity through (informational and physical) collaboration and modeling
Abstract: A vision of tools to support software development organizations in the process of development, maintenance and evolution of systems is presented. The envisioned tools see...
Daniel C. M. May, Bent Bruun Kristensen, Palle Now...
ISICT
2003
13 years 6 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
ISICT
2003
13 years 6 months ago
Security in the Web Services Framework
The Web Services Framework provides techniques to enable the application-toapplication use of the Web. It has the potential of becoming the core of a new Web-based middleware plat...
Chen Li 0008, Claus Pahl
ISICT
2003
13 years 6 months ago
Applications considered harmful for ambient systems
The notion of application – a single, bounded piece of functionality presented to users – goes almost unquestioned. However in the context of highly adaptive and ambient system...
Simon Dobson