Sciweavers

1897 search results - page 38 / 380
» Early application identification
Sort
View
GEOS
2005
Springer
15 years 5 months ago
Exploiting Geospatial Markers to Explore and Resocialize Localized Documents
Corpus resocialization can be achieved through digital revitalizing, i.e., making a corpus available for new users with new uses. We propose a semi-automatic identification of spat...
Christophe Marquesuzaà, Patrick Etcheverry,...
ICST
2009
IEEE
14 years 9 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
COMPLIFE
2006
Springer
15 years 3 months ago
High-Throughput Identification of Chemistry in Life Science Texts
. OSCAR3 is an open extensible system for the automated annotation of chemistry in scientific articles, which can process thousands of articles per hour. This XML annotation suppor...
Peter Corbett, Peter Murray-Rust
ICISC
2000
126views Cryptology» more  ICISC 2000»
15 years 1 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
CAISE
2003
Springer
15 years 3 months ago
The Focus of Requirements Engineering in Workflow Application Development
The paper discusses the focus of Requirements Engineering in workflow application development. Its core thesis is that the workflow application and the new business process it supp...
Niko Kleiner