Sciweavers

4166 search results - page 730 / 834
» Automating the constraining process
Sort
View
IJCAI
2003
15 years 4 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván
WIIW
2001
116views more  WIIW 2001»
15 years 4 months ago
Digital Library Services Supporting Information Integration over the Web
Our research and development activities in digital libraries raised relevant features in supporting Web information integration. Underlain by an in house multi-agent based architec...
Tarcisio Lima, Amit P. Sheth, Naveen Ashish, Mukes...
WORM
2004
15 years 4 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
DGO
2000
91views Education» more  DGO 2000»
15 years 4 months ago
Simplifying data access: the energy data collection (EDC) project
The massive amount of statistical and text data available from government agencies has created a set of daunting challenges to both research and analysis communities. These proble...
José Luis Ambite, Yigal Arens, Luis Gravano...
IADT
1998
100views more  IADT 1998»
15 years 4 months ago
Task Handling in Workflow Management Systems
Work ow management systems aim to automate the execution of business processes. One of the objectives of the work ow systems is to include the already existing applications such a...
Pinar Karagoz, Sena Nural Arpinar, Pinar Koksal, N...