Sciweavers

13822 search results - page 2515 / 2765
» Models in Knowledge Management
Sort
View
ACSAC
2006
IEEE
15 years 8 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
AIRS
2004
Springer
15 years 8 months ago
Combining Sentence Length with Location Information to Align Monolingual Parallel Texts
Abundant Chinese paraphrasing resource on Internet can be attained from different Chinese translations of one foreign masterpiece. Paraphrases corpus is the corpus that includes s...
Weigang Li, Ting Liu, Sheng Li
AIRS
2006
Springer
15 years 8 months ago
A Novel Ant-Based Clustering Approach for Document Clustering
Recently, much research has been proposed using nature inspired algorithms to perform complex machine learning tasks. Ant Colony Optimization (ACO) is one such algorithm based on s...
Yulan He, Siu Cheung Hui, Yongxiang Sim
BPM
2004
Springer
95views Business» more  BPM 2004»
15 years 8 months ago
On Dealing with Structural Conflicts between Process Type and Instance Changes
Abstract. Adaptive process management systems must be able to support changes of single process instances as well as modifications at the process type level and their propagation t...
Stefanie Rinderle, Manfred Reichert, Peter Dadam
CCGRID
2004
IEEE
15 years 8 months ago
GTP: group transport protocol for lambda-Grids
The notion of lambda-Grids posits plentiful collections of computing and storage resources richly interconnected by dedicated dense wavelength division multiplexing (DWDM) optical...
Xinran (Ryan) Wu, Andrew A. Chien
« Prev « First page 2515 / 2765 Last » Next »