Sciweavers

2795 search results - page 324 / 559
» Recommended or Not
Sort
View
131
Voted
WWW
2008
ACM
15 years 19 days ago
Flexible Semantic-Based Service Matchmaking and Discovery
Automated techniques and tools are required to effectively locate services that fulfill a given user request in a mobility context. To this purpose, the use of semantic description...
Devis Bianchini, Valeria De Antonellis, Michele Me...
CCE
2004
15 years 18 days ago
Tabu search algorithm for chemical process optimization
: This paper presents a meta-heuristic optimization algorithm, Tabu Search (TS), and describes how it can be used to solve a wide variety of chemical engineering problems. Modifica...
B. Lin, D. C. Miller
81
Voted
COMPSEC
2004
156views more  COMPSEC 2004»
15 years 18 days ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
107
Voted
CN
2002
85views more  CN 2002»
15 years 17 days ago
Analysis of delay and delay jitter of voice traffic in the Internet
In the future, voice communication is expected to migrate from the public switched telephone network to the Internet. Because of the particular characteristics (low volume and bur...
Mansour J. Karam, Fouad A. Tobagi
EOR
2002
93views more  EOR 2002»
15 years 17 days ago
The cultural roots linking Europe
It is argued that the cultural roots within Europe are powerful links and that there exist other regions as well, powerfully stamped by Indian, Chinese, Japanese, or Arabian and o...
Heiner Müller-Merbach