Sciweavers

601 search results - page 110 / 121
» A Simulink(c)-Based Approach to System Level Design and Arch...
Sort
View
ICTAI
2008
IEEE
15 years 4 months ago
Information Extraction as an Ontology Population Task and Its Application to Genic Interactions
Ontologies are a well-motivated formal representation to model knowledge needed to extract and encode data from text. Yet, their tight integration with Information Extraction (IE)...
Alain-Pierre Manine, Érick Alphonse, Philip...
FAST
2008
15 years 3 days ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
SACMAT
2011
ACM
14 years 18 days ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
HICSS
2007
IEEE
124views Biometrics» more  HICSS 2007»
15 years 4 months ago
POSAML: A Visual Modeling Framework for Middleware Provisioning
Effective provisioning of next generation distributed applications hosted on diverse middleware platforms incurs significant challenges due to the applications’ growing complex...
Dimple Kaul, Arundhati Kogekar, Aniruddha S. Gokha...
DAC
2000
ACM
15 years 10 months ago
Fingerprinting intellectual property using constraint-addition
Recently, intellectual property protection (IPP) techniques attracted a great deal of attention from semiconductor, system integration and software companies. A number of watermar...
Gang Qu, Miodrag Potkonjak