Sciweavers

17471 search results - page 3328 / 3495
» Information Modeling
Sort
View
ISI
2006
Springer
15 years 5 months ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
JUCS
2008
113views more  JUCS 2008»
15 years 5 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JUCS
2008
130views more  JUCS 2008»
15 years 5 months ago
Experimenting the Automated Selection of COTS Components Based on Cost and System Requirements
: In a component-based development process the selection of components is an activity that takes place over multiple lifecycle phases that span from requirement specifications thro...
Vittorio Cortellessa, Ivica Crnkovic, Fabrizio Mar...
KER
2008
107views more  KER 2008»
15 years 5 months ago
Tuplespace-based computing for the Semantic Web: a survey of the state-of-the-art
Semantic technologies promise to solve many challenging problems of the present Web applications. As they achieve a feasible level of maturity, they become increasingly accepted i...
Lyndon J. B. Nixon, Elena Paslaru Bontas Simperl, ...
ESWA
2007
127views more  ESWA 2007»
15 years 5 months ago
Clustering support vector machines for protein local structure prediction
Understanding the sequence-to-structure relationship is a central task in bioinformatics research. Adequate knowledge about this relationship can potentially improve accuracy for ...
Wei Zhong, Jieyue He, Robert W. Harrison, Phang C....
« Prev « First page 3328 / 3495 Last » Next »