Sciweavers

4812 search results - page 871 / 963
» Superimposed Information for the Internet
Sort
View
ISSA
2004
15 years 3 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
IM
2003
15 years 3 months ago
A Scalable and Efficient Inter-domain QoS Routing Architecture for Diffserv Networks
: With Bandwidth Broker (BB) support in each domain, Differentiated Services (Diffserv) is seen as a key technology for achieving QoS guarantees in a scalable, efficient, and deplo...
Haci A. Mantar, Junseok Hwang, Steve J. Chapin, Ib...
TREC
2004
15 years 3 months ago
Evolving XML and Dictionary Strategies for Question Answering and Novelty Tasks
CL Research participated in the question answering and novelty tracks in TREC 2004. The Knowledge Management System (KMS), which provides a single interface for question answering...
Kenneth C. Litkowski
WSC
2001
15 years 3 months ago
Distributed simulation: an enabling technology for the evaluation of virtual enterprises
This paper presents an application distributed simulation to the evaluation of virtual enterprises. Each company or candidate can use a simulation of its facilities to determine i...
Jayendran Venkateswaran, Mohammed Yaseen Kalachika...
MASCOTS
2003
15 years 3 months ago
NAM: A Network Adaptable Middleware to Enhance Response Time of Web Services
Web Services are an emerging software technology that employ XML to share and exchange data. They may serve as wrappers for legacy data sources, integrate multiple remote data sou...
Shahram Ghandeharizadeh, Christos Papadopoulos, Pa...