Sciweavers

2795 search results - page 324 / 559
» Recommended or Not
Sort
View
WWW
2008
ACM
15 years 5 months ago
Flexible Semantic-Based Service Matchmaking and Discovery
Automated techniques and tools are required to effectively locate services that fulfill a given user request in a mobility context. To this purpose, the use of semantic description...
Devis Bianchini, Valeria De Antonellis, Michele Me...
CCE
2004
15 years 5 months ago
Tabu search algorithm for chemical process optimization
: This paper presents a meta-heuristic optimization algorithm, Tabu Search (TS), and describes how it can be used to solve a wide variety of chemical engineering problems. Modifica...
B. Lin, D. C. Miller
COMPSEC
2004
156views more  COMPSEC 2004»
15 years 5 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
CN
2002
85views more  CN 2002»
15 years 5 months ago
Analysis of delay and delay jitter of voice traffic in the Internet
In the future, voice communication is expected to migrate from the public switched telephone network to the Internet. Because of the particular characteristics (low volume and bur...
Mansour J. Karam, Fouad A. Tobagi
125
Voted
EOR
2002
93views more  EOR 2002»
15 years 5 months ago
The cultural roots linking Europe
It is argued that the cultural roots within Europe are powerful links and that there exist other regions as well, powerfully stamped by Indian, Chinese, Japanese, or Arabian and o...
Heiner Müller-Merbach