Sciweavers

8479 search results - page 1542 / 1696
» Data Extraction from Web Data Sources
Sort
View
ICICS
2005
Springer
15 years 9 months ago
Secure Multicast Using Proxy Encryption
In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one “group key” ...
Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
108
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Subtext: uncovering the simplicity of programming
Representing programs as text strings makes programming harder then it has to be. The source text of a program is far removed from its behavior. Bridging this conceptual gulf is w...
Jonathan Edwards
OTM
2005
Springer
15 years 9 months ago
A Service-Oriented Workflow Language for Robust Interacting Applications
Abstract. In a service-oriented world, a long-running business process can be implemented as a set of stateful services that represent the individual but coordinated steps that mak...
Surya Nepal, Alan Fekete, Paul Greenfield, Julian ...
MM
2004
ACM
137views Multimedia» more  MM 2004»
15 years 9 months ago
Towards auto-documentary: tracking the evolution of news stories
News videos constitute an important source of information for tracking and documenting important events. In these videos, news stories are often accompanied by short video shots t...
Pinar Duygulu, Jia-Yu Pan, David A. Forsyth
107
Voted
GECCO
2004
Springer
119views Optimization» more  GECCO 2004»
15 years 8 months ago
Learning Environment for Life Time Value Calculation of Customers in Insurance Domain
A critical success factor in Insurance business is its ability to use information sources and contained knowledge in the most effective way. Its profitability is obtained through t...
Andrea Tettamanzi, Luca Sammartino, Mikhail Simono...
« Prev « First page 1542 / 1696 Last » Next »