Sciweavers

1527 search results - page 74 / 306
» A Survey of Web Security
Sort
View
RULEML
2005
Springer
15 years 4 months ago
A Realistic Architecture for the Semantic Web
In this paper we argue that a realistic architecture for the Semantic Web must be based on multiple independent, but interoperable, stacks of languages. In particular, we argue tha...
Michael Kifer, Jos de Bruijn, Harold Boley, Dieter...
BIS
2006
106views Business» more  BIS 2006»
15 years 23 days ago
Expected Utility of Content Blocks in Web Content Extraction
In this paper we discuss the possible application of new concepts in web content extraction: utility assessment, utility annealing, and dynamic aggregated document generation. Aft...
Marek Kowalkiewicz
DATE
2005
IEEE
141views Hardware» more  DATE 2005»
15 years 1 months ago
Multimedia Applications of Multiprocessor Systems-on-Chips
This paper surveys the characteristics of multimedia systems. Multimedia applications today are dominated by compression and decompression, but multimedia devices must also implem...
Wayne Wolf
CSFW
2008
IEEE
15 years 5 months ago
Security Decision-Making among Interdependent Organizations
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
FOSSACS
2005
Springer
15 years 4 months ago
Model Checking for Nominal Calculi
Nominal calculi have been shown very effective to formally model a variety of computational phenomena. The models of nominal calculi have often infinite states, thus making model ...
Gian Luigi Ferrari, Ugo Montanari, Emilio Tuosto