Sciweavers

8479 search results - page 1581 / 1696
» Data Extraction from Web Data Sources
Sort
View
112
Voted
CN
2007
80views more  CN 2007»
15 years 3 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 3 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
IPM
2007
69views more  IPM 2007»
15 years 3 months ago
Investigating sentence weighting components for automatic summarisation
The work described here initially formed part of a triangulation exercise to establish the effectiveness of the Query Term Order algorithm. The methodology produced subsequently p...
Shao Fen Liang, Siobhan Devlin, John Tait
ENTCS
2002
145views more  ENTCS 2002»
15 years 3 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
IJCIM
2002
128views more  IJCIM 2002»
15 years 3 months ago
Web-based design and manufacturing systems for automobile components: architectures and usability studies
In this paper the architectures and usability issues of web-based software tools are discussed. For the development of automobile lighting components, various designers, developers...
Sung H. Ahn, Balaji Bharadwaj, Humayun Khalid, Shu...
« Prev « First page 1581 / 1696 Last » Next »