Sciweavers

861 search results - page 85 / 173
» Persistent Object Systems: From Technology to Market
Sort
View
ACSAC
2005
IEEE
15 years 5 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
WWW
2001
ACM
16 years 16 days ago
Communication design for electronic negotiations on the basis of XML schema
Representation of negotiations in electronic markets and their support are important issues in today's e-commerce research. Whereas most activities are focused on automation ...
Michael Ströbel
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 5 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker
KES
2006
Springer
14 years 11 months ago
Intelligent Environment for Training of Power Systems Operators
Training of operators has become an important problem to be faced by power systems: updating knowledge and skills. An operator must comprehend the physical operation of the process...
Gustavo Arroyo-Figueroa, Yasmín Herná...
ICWE
2003
Springer
15 years 5 months ago
X-SHAAD: An XML Implementation for Hypermedia Systems Modeling through SHAAD
Abstract. In this paper we present an implementation using XML and Java (XSHAAD) based on a modular architecture of SHAAD to support a web-based Adaptive Hypermedia System. This ar...
David Mérida, Ramón Fabregat, Carlos...