Sciweavers

6931 search results - page 1322 / 1387
» Context and Design Agents
Sort
View
ICEBE
2007
IEEE
174views Business» more  ICEBE 2007»
15 years 4 months ago
Worksheet-Driven UMM Modeling of B2B Services
In the development process of a B2B system it is crucial that the business experts are able to express and evaluate agreements and commitments between the partners and that the so...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
INFOCOM
2007
IEEE
15 years 4 months ago
Cooperating with Smartness: Using Heterogeneous Smart Antennas in Ad-Hoc Networks
Abstract— The ability of smart antennas to improve performance in a typically constrained ad-hoc network environment, has helped them garner significant attention over the last ...
Karthikeyan Sundaresan, Raghupathy Sivakumar
NDSS
2007
IEEE
15 years 4 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
15 years 4 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
CIKM
2007
Springer
15 years 4 months ago
Reusing relational sources for semantic information access
The rapid growth of available data arises the need for more sophisticated techniques for semantic access to information. It has been proved that using conceptual model or ontology...
Lina Lubyte
« Prev « First page 1322 / 1387 Last » Next »