Sciweavers

3006 search results - page 483 / 602
» Overview
Sort
View
116
Voted
COMCOM
2000
95views more  COMCOM 2000»
15 years 19 days ago
Countermeasures for mobile agent security
: Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in...
Wayne A. Jansen
82
Voted
IDA
2000
Springer
15 years 19 days ago
From machine learning to knowledge discovery: Survey of preprocessing and postprocessing
Knowledge Discovery in Databases (KDD) has become a very attractive discipline both for research and industry within last few years. Its goal is to extract pieces of knowledge or `...
Ivan Bruha
87
Voted
IJMMS
2000
85views more  IJMMS 2000»
15 years 19 days ago
Ontology-driven document enrichment: principles, tools and applications
In this paper we present an approach to document enrichment, which consists of developing and integrating formal knowledge models with archives of documents, to provide intelligent...
Enrico Motta, Simon Buckingham Shum, John Domingue
101
Voted
DPD
2002
100views more  DPD 2002»
15 years 19 days ago
Light-Weight Currency Management Mechanisms in Mobile and Weakly-Connected Environments
This paper discusses the currency management mechanisms used in Deno, a replicated object storage system designed for use in mobile and weakly-connected environments. Deno primari...
Ugur Çetintemel, Peter J. Keleher
EL
2002
181views more  EL 2002»
15 years 19 days ago
Aspects of networking in multiplayer computer games
Distributed, real-time multiplayer computer games (MCGs) are in the vanguard of utilizing the networking possibilities. Although related research have been done in military simulat...
Jouni Smed, Timo Kaukoranta, Harri Hakonen