Sciweavers

3674 search results - page 303 / 735
» Information Dependencies
Sort
View
93
Voted
ISSA
2004
15 years 2 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
134
Voted
ICPR
2010
IEEE
14 years 10 months ago
3D Vertebral Body Segmentation Using Shape Based Graph Cuts
Bone mineral density (BMD) measurements and fracture analysis of the spine bones are restricted to the Vertebral bodies (VBs). In this paper, we propose a novel 3D shape based met...
Melih S. Aslan, Asem M. Ali, Aly A. Farag, Ham M. ...
RWEB
2005
Springer
15 years 6 months ago
Personalization for the Semantic Web
Searching for the meaning of the word “personalization” on a popular search engine, one finds twenty-three different answers, including “the process of matching categorized...
Matteo Baldoni, Cristina Baroglio, Nicola Henze
94
Voted
ECIR
2004
Springer
15 years 2 months ago
Identification of Relevant and Novel Sentences Using Reference Corpus
In the novelty task on sentence level, the amount of information used in similarity computation is the major challenging issue. A shallow NLP approach extracts noun and verb featu...
Hsin-Hsi Chen, Ming-Feng Tsai, Ming-Hung Hsu
CCGRID
2010
IEEE
15 years 1 months ago
Dynamic TTL-Based Search in Unstructured Peer-to-Peer Networks
Abstract--Resource discovery is a challenging issue in unstructured peer-to-peer networks. Blind search approaches, including flooding and random walks, are the two typical algorit...
Imen Filali, Fabrice Huet