Sciweavers

227 search results - page 24 / 46
» Defining and Monitoring Knowledge Integrity
Sort
View
ACC
2011
65views more  ACC 2011»
13 years 9 months ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis
LREC
2008
114views Education» more  LREC 2008»
14 years 11 months ago
UFRA: a UIMA-based Approach to Federated Language Resource Architecture
In this paper we address the issue of developing an interoperable infrastructure for language resources and technologies. In our approach, called UFRA, we extend the Federate Data...
Riccardo Del Gratta, Roberto Bartolini, Tommaso Ca...
78
Voted
AINA
2010
IEEE
15 years 2 months ago
Towards Adaptive Mobile Mashups: Opportunities for Designing Effective Persuasive Technology on the Road
— Today’s vehicles and on-road infrastructures are equipped with a large number of sophisticated sensory devices. These sensory devices are capable of monitoring and providing ...
Flora Dilys Salim
IJNSEC
2006
89views more  IJNSEC 2006»
14 years 9 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara
DILS
2004
Springer
15 years 1 months ago
An Ontology-Driven Framework for Data Transformation in Scientific Workflows
Abstract. Ecologists spend considerable effort integrating heterogeneous data for statistical analyses and simulations, for example, to run and test predictive models. Our research...
Shawn Bowers, Bertram Ludäscher