Sciweavers

3581 search results - page 553 / 717
» Modeling the Internet
Sort
View
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 9 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
IUI
2003
ACM
15 years 9 months ago
Sticky notes for the semantic web
Computer-based annotation is increasing in popularity as a mechanism for revising documents and sharing comments over the Internet. One reason behind this surge is that viewpoints...
David R. Karger, Boris Katz, Jimmy J. Lin, Dennis ...
MSWIM
2003
ACM
15 years 9 months ago
Parallel adaptive mobile web clipping
– Wireless mobile access to the Internet is an indispensable tool for private and corporate users alike; but both industry and academia recognize the need for better service. Imp...
Alex Vrenios
EWMF
2003
Springer
15 years 9 months ago
Mining Web Sites Using Wrapper Induction, Named Entities, and Post-processing
This paper presents a novel method for extracting information from collections of Web pages across different sites. Our method uses a standard wrapper induction algorithm and explo...
Georgios Sigletos, Georgios Paliouras, Constantine...
APSCC
2009
IEEE
15 years 9 months ago
Extended policies for automatic service composition in IMS
— Service creation by composing existing services and/or network resources is considered by Telecom and Internet industries as the trend for service provisioning in Next Generati...
Cuiting Huang, Noël Crespi