Sciweavers

1700 search results - page 177 / 340
» Introducing Business Process into Legacy Information Systems
Sort
View
ACL
2006
14 years 11 months ago
Segment-Based Hidden Markov Models for Information Extraction
Hidden Markov models (HMMs) are powerful statistical models that have found successful applications in Information Extraction (IE). In current approaches to applying HMMs to IE, a...
Zhenmei Gu, Nick Cercone
87
Voted
WWW
2006
ACM
15 years 11 months ago
WS-replication: a framework for highly available web services
Due to the rapid acceptance of web services and its fast spreading, a number of mission-critical systems will be deployed as web services in next years. The availability of those ...
Jorge Salas, Francisco Perez-Sorrosal, Marta Pati&...
IEEEIAS
2009
IEEE
15 years 4 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
86
Voted
SEMCO
2007
IEEE
15 years 4 months ago
A Semantic Matching Algorithm for Discovery in UDDI
One of the key objectives of web service technology is to construct processes that enable service providers to inter-connect with their clients. The industry has developed the UDD...
Unai Aguilera, Joseba Abaitua, Josuka Diaz, David ...
86
Voted
PRICAI
2000
Springer
15 years 1 months ago
Virtual Enterprise Design - BDI Agents vs. Objects
Current research identifying architectures for a virtual enterprise has moved from information modelling to role modelling. Thus, a high level of autonomy results from the distribu...
Iyad Rahwan, Ryszard Kowalczyk, Yun Yang