Sciweavers

2381 search results - page 404 / 477
» On Ordering Descriptions in a Description Logic
Sort
View
SASN
2003
ACM
15 years 6 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
CAISE
2003
Springer
15 years 6 months ago
Designing Ubiquitous Personalized TV-Anytime Services
In this paper we present the design of an environment that offers personalized, ubiquitous information services in the emerging integrated world of the digital-TV and the Internet....
Fotis G. Kazasis, Nektarios Moumoutzis, Nikos Papp...
ICCBR
2003
Springer
15 years 6 months ago
Case Mining from Large Databases
Abstract. This paper presents an approach of case mining to automatically discover case bases from large datasets in order to improve both the speed and the quality of case based r...
Qiang Yang, Hong Cheng
CHI
2010
ACM
15 years 6 months ago
Cultural difference in image tagging
Do people from different cultures tag digital images differently? The current study compared the content of tags for digital images created by two cultural groups: European Americ...
Wei Dong, Wai-Tat Fu
ASWEC
2009
IEEE
15 years 6 months ago
Connector-Driven Process for the Gradual Evolution of Component-Based Software
Large, complex and long-lived software need to be upgraded at runtime. Addition, removal and replacement of a software component are the elementary evolution operations that have ...
Huaxi (Yulin) Zhang, Christelle Urtado, Sylvain Va...