Sciweavers

6819 search results - page 1188 / 1364
» Process Reuse Architecture
Sort
View
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
WWW
2005
ACM
15 years 10 months ago
An information extraction engine for web discussion forums
In this poster, we present an information extraction engine for web-based forums. The engine analyzes the HTML files crawled from web forums, deduces the wrapper (template) of the...
Hanny Yulius Limanto, Nguyen Ngoc Giang, Vo Tan Tr...
CLEF
2005
Springer
15 years 10 months ago
BulQA: Bulgarian-Bulgarian Question Answering at CLEF 2005
This paper describes the architecture of a Bulgarian–Bulgarian question answering system — BulQA. The system relies on a partially parsed corpus for answer extraction. The que...
Kiril Ivanov Simov, Petya Osenova
DFKI
2005
Springer
15 years 10 months ago
Agents Enacting Social Roles. Balancing Formal Structure and Practical Rationality in MAS Design
Abstract. We introduce an integrated approach to the conceptualisation, implementation and evaluation of a MAS (multi-agent system) which is based on sociological concepts of pract...
Martin Meister 0002, Diemo Urbig, Kay Schröte...
DRMTICS
2005
Springer
15 years 10 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
« Prev « First page 1188 / 1364 Last » Next »