Sciweavers

1757 search results - page 147 / 352
» Secure Content Validation
Sort
View
EKAW
2006
Springer
15 years 3 months ago
Ontology Engineering, Scientific Method and the Research Agenda
Abstract. The call for a "focus on content" in ontology research by Nicola Guarino and Mark Musen in their launching statement of the journal Applied Ontology has quite s...
Hans Akkermans, Jaap Gordijn
ICSEA
2009
IEEE
14 years 9 months ago
Development of CMS-Based Web-Applications Using a Model-Driven Approach
The emerging Model-Driven Engineering paradigm advocates the use of models as first-class citizens in the software development process, while artifacts such as documentation and so...
João de Sousa Saraiva, Alberto Rodrigues da...
CORR
2000
Springer
100views Education» more  CORR 2000»
14 years 11 months ago
Algorithms for Analysing Firewall and Router Access Lists
Network firewalls and routers use a rule database to decide which packets will be allowed from one network onto another. By filtering packets the firewalls and routers can improve...
Scott Hazelhurst
WISA
2005
Springer
15 years 5 months ago
Video Fingerprinting System Using Wavelet and Error Correcting Code
In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the ...
Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, H...
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 2 months ago
Oracle database filesystem
Modern enterprise, web, and multimedia applications are generating unstructured content at unforeseen volumes in the form of documents, texts, and media files. Such content is gen...
Krishna Kunchithapadam, Wei Zhang, Amit Ganesh, Ni...