Sciweavers

24529 search results - page 4559 / 4906
» Computing on Authenticated Data
Sort
View
SEMWEB
2010
Springer
15 years 2 months ago
Optimising Ontology Classification
Abstract. Ontology classification--the computation of subsumption hierarchies for classes and properties--is one of the most important tasks for OWL reasoners. Based on the algorit...
Birte Glimm, Ian Horrocks, Boris Motik, Giorgos St...
SIGSOFT
2010
ACM
15 years 2 months ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan
TSD
2010
Springer
15 years 2 months ago
Embedded Speech Recognition in UPnP (DLNA) Environment
In the past decade great technological advances have been made in internet services, personal computers, telecommunications, media and entertainment. Many of these advances have be...
Jozef Ivanecký, Radek Hampl
UIST
2010
ACM
15 years 2 months ago
Combining multiple depth cameras and projectors for interactions on, above and between surfaces
Instrumented with multiple depth cameras and projectors, LightSpace is a small room installation designed to explore a variety of interactions and computational strategies related...
Andrew D. Wilson, Hrvoje Benko
USS
2010
15 years 2 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
« Prev « First page 4559 / 4906 Last » Next »