Sciweavers

4340 search results - page 858 / 868
» Formal Methods and Cryptography
Sort
View
ESWA
2006
122views more  ESWA 2006»
14 years 11 months ago
Ontology construction for information classification
Following the advent of the Internet technology and the rapid growth of its applications, users have spent long periods of time browsing through the ocean of information found in ...
Sung-Shun Weng, Hsine-Jen Tsai, Shang-Chia Liu, Ch...
CN
2007
91views more  CN 2007»
14 years 11 months ago
On investigating overlay service topologies
Recently, a moderate amount of work has been reported on the use of overlay networks to support value-added network services, such as multicasting, Quality of Service (QoS), secur...
Zhi Li, Prasant Mohapatra
IJSN
2006
65views more  IJSN 2006»
14 years 11 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
JCB
2006
125views more  JCB 2006»
14 years 11 months ago
Hypothesis Generation in Signaling Networks
Biological signaling networks comprise the chemical processes by which cells detect and respond to changes in their environment. Such networks have been implicated in the regulati...
Derek A. Ruths, Luay Nakhleh, M. Sriram Iyengar, S...
JUCS
2008
194views more  JUCS 2008»
14 years 11 months ago
An Application of Meta Search Agent System Based on Semantized Tags for Enhanced Web Searching
: Web searching techniques have been investigated and implemented in many aspects. Particularly, in case of personalization, more important issue is how to manipulate the results r...
Chonggun Kim, JaeYoun Jung, Hyeon-Cheol Zin, Jason...