Sciweavers

2235 search results - page 378 / 447
» Quality of Service and Optimization in Data Integration Syst...
Sort
View
WWW
2004
ACM
16 years 2 months ago
Semantic web applications to e-science in silico experiments
This paper explains our research and implementations of manual, automatic and deep annotations of provenance logs for e-Science in silico experiments. Compared to annotating gener...
Jun Zhao, Carole A. Goble, Robert Stevens
MHCI
2009
Springer
15 years 8 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
KR
2004
Springer
15 years 6 months ago
Advanced Research with Autonomous Unmanned Aerial Vehicles
Abstract The emerging area of intelligent unmanned aerial vehicle (UAV) research has shown rapid development in recent years and offers a great number of research challenges for ar...
Patrick Doherty
TNC
2004
120views Education» more  TNC 2004»
15 years 2 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
COBUILD
1998
Springer
15 years 5 months ago
An Agent-Based Telecooperation Framework
Abstract. As the amount of information and communication increases dramatically new working environments must provide efficient mechanisms to maximize the benefits of these develop...
Albrecht Schmidt, Alexander Specker, Gerhard Parts...