Sciweavers

2704 search results - page 464 / 541
» Constraint Management in Engineering of Complex Information ...
Sort
View
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
15 years 8 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
IAW
2003
IEEE
15 years 6 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
CIKM
2001
Springer
15 years 6 months ago
Relevance Score Normalization for Metasearch
Given the ranked lists of documents returned by multiple search engines in response to a given query, the problem of metasearch is to combine these lists in a way which optimizes ...
Mark H. Montague, Javed A. Aslam
DLOG
2003
15 years 2 months ago
Status Report on Description Logics related Project in Korea
In this short position paper, the project of building intelligent business information infrastructure using semantic web, ontology, description logics, and other related knowledge...
Shinyoung Lim
EL
2010
172views more  EL 2010»
15 years 1 days ago
Computer literacy skills of librarians: a case study of Isfahan University libraries, Iran
We live in a computer-centric information age. The number of computers in-use including in libraries is growing rapidly. Computer literacy, which is the ability to operate a compu...
Hajar Safahieh, Asefeh Asemi