Sciweavers

8503 search results - page 1407 / 1701
» Secure Software Architectures
Sort
View
WWW
2007
ACM
16 years 1 months ago
Extending WebML towards semantic web
Available methodologies for developing Sematic Web applications do not fully exploit the whole potential deriving from interaction with ontological data sources. Here we introduce...
Federico Michele Facca, Marco Brambilla
129
Voted
WWW
2006
ACM
16 years 1 months ago
Effective web-scale crawling through website analysis
The web crawler space is often delimited into two general areas: full-web crawling and focused crawling. We present netSifter, a crawler system which integrates features from thes...
Iván Gonzlez, Adam Marcus 0002, Daniel N. M...
WWW
2005
ACM
16 years 1 months ago
An adaptive middleware infrastructure for mobile computing
In a mobile environment where mobile applications suffer from the limitation and variation of system resources availability, it is desirable for the applications to adapt their be...
Ronnie Cheung
97
Voted
WWW
2004
ACM
16 years 1 months ago
Web customization using behavior-based remote executing agents
ReAgents are remotely executing agents that customize Web browsing for non-standard resource-limited clients. A reAgent is essentially a "one-shot" mobile agent that act...
Eugene Hung, Joseph Pasquale
VLSID
2004
IEEE
212views VLSI» more  VLSID 2004»
16 years 1 months ago
On Design and Implementation of an Embedded Automatic Speech Recognition System
We present a new design of an Embedded Speech Recognition System. It combines the aspects of both hardware and software design to implement a speaker dependent, isolated word, sma...
Sujay Phadke, Rhishikesh Limaye, Siddharth Verma, ...
« Prev « First page 1407 / 1701 Last » Next »