Sciweavers

425 search results - page 77 / 85
» Creating Shared Knowledge: Instructional Knowledge Managemen...
Sort
View
SIS
2008
15 years 1 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
ACSW
2006
15 years 1 months ago
Toward building grid applications in bioinformatics
In silico bioinformatics experiments involve integration of and access to computational tools and biological databases. The emerging grid computing technologies enable bioinformat...
Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro ...
COOPIS
2003
IEEE
15 years 5 months ago
Automatic Expansion of Manual Email Classifications Based on Text Analysis
The organization of documents is a task that we face as computer users daily. This is particularly true for management of email. Typically email documents are organized in director...
Enrico Giacoletto, Karl Aberer
86
Voted
IDA
2010
Springer
15 years 3 months ago
Deterministic Finite Automata in the Detection of EEG Spikes and Seizures
This Paper presents a platform to mine epileptiform activity from Electroencephalograms (EEG) by combining the methodologies of Deterministic Finite Automata (DFA) and Knowledge Di...
Rory A. Lewis, Doron Shmueli, Andrew M. White
88
Voted
FTDCS
2004
IEEE
15 years 3 months ago
A New Perspective in Defending against DDoS
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale...
Shigang Chen, Randy Chow