Sciweavers

2414 search results - page 434 / 483
» Reasoning Support for OWL-E
Sort
View
SAC
2006
ACM
15 years 3 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
ICSM
2005
IEEE
15 years 3 months ago
Comparison of Clustering Algorithms in the Context of Software Evolution
To aid software analysis and maintenance tasks, a number of software clustering algorithms have been proposed to automatically partition a software system into meaningful subsyste...
Jingwei Wu, Ahmed E. Hassan, Richard C. Holt
ISLPED
2005
ACM
86views Hardware» more  ISLPED 2005»
15 years 3 months ago
An evaluation of code and data optimizations in the context of disk power reduction
Disk power management is becoming increasingly important in high-end server and cluster type of environments that execute dataintensive applications. While hardware-only approache...
Mahmut T. Kandemir, Seung Woo Son, Guangyu Chen
MIR
2005
ACM
197views Multimedia» more  MIR 2005»
15 years 3 months ago
Enhanced ontologies for video annotation and retrieval
A typical way to perform video annotation requires to classify video elements (e.g. events and objects) according to some pre-defined ontology of the video content domain. Ontolo...
Marco Bertini, Alberto Del Bimbo, Carlo Torniai
MOBIDE
2005
ACM
15 years 3 months ago
Recovery of mobile internet transactions: algorithm, implementation and analysis
The increasing popularity of mobile devices and the support of web portals towards performing transactions from these mobile devices has enabled business on the move. However, int...
Shashi Anand, Krithi Ramamritham