Sciweavers

13822 search results - page 2533 / 2765
» Models in Knowledge Management
Sort
View
SEC
2004
15 years 5 months ago
Interactive Access Control for Web Services
Business Processes for Web Services (BPEL4WS) are the new paradigms for lightweight enterprise integration. They cross organizational boundaries and are provided by entities that s...
Hristo Koshutanski, Fabio Massacci
COLING
2000
15 years 5 months ago
The effects of analysing cohesion on document summarisation
We argue that in general, the analysis of lexical cohesion factors in a document can drive a summarizer, as well as enable other content characterization tasks. More narrowly, thi...
Branimir Boguraev, Mary S. Neff
VMV
2003
135views Visualization» more  VMV 2003»
15 years 5 months ago
Derma: Monitoring the Evolution of Skin Lesions with a 3D System
We present a new integrated tool, DERMA, which allows to measure and assess the time evolution of chronic wounds. A laser triangulation 3D scanner is used to acquire the wound geo...
Marco Callieri, Paolo Cignoni, Paolo Pingi, Robert...
DOA
2000
169views more  DOA 2000»
15 years 5 months ago
DOORS: Towards High-Performance Fault Tolerant CORBA
An increasing number of applications are being developed using distributed object computing middleware, such as CORBA. Many of these applications require the underlying middleware...
Balachandran Natarajan, Aniruddha S. Gokhale, Shal...
WORM
2003
15 years 5 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
« Prev « First page 2533 / 2765 Last » Next »