Sciweavers

3108 search results - page 63 / 622
» The Elements of Computer Credibility
Sort
View
APNOMS
2007
Springer
15 years 1 months ago
OMA DM Based Remote Software Debugging of Mobile Devices
The mobile devices have gained much functionality and intelligence with the growth of network technologies, the abundance of network resources, and the increase of various services...
Joon-Myung Kang, Hong-Taek Ju, Mi-Jung Choi, James...
EEE
2004
IEEE
15 years 1 months ago
Spreading Activation Models for Trust Propagation
Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subj...
Cai-Nicolas Ziegler, Georg Lausen
DIMVA
2006
14 years 11 months ago
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks and suspect tools as part of a computer crime recons...
André Årnes, Paul Haas, Giovanni Vign...
COMPUTING
1999
128views more  COMPUTING 1999»
14 years 9 months ago
A Multigrid Method for Nonconforming FE-Discretisations with Application to Non-Matching Grids
Nonconforming finite element discretisations require special care in the construction of the prolongation andrestrictioninthemultigridprocess. Inthispaper,ageneralschemeisproposed...
Dietrich Braess, Maksimillian Dryja, Wolfgang Hack...
WECWIS
2005
IEEE
156views ECommerce» more  WECWIS 2005»
15 years 3 months ago
EXSMAL: EDI/XML Semi-Automatic Schema Matching ALgorithm
We describe a schema matching algorithm EXSMAL that automates the semantic correspondence discovery between the EDI (Electronic Data Interchange) messages of various standards (ED...
Uddam Chukmol, Rami Rifaieh, Aïcha-Nabila Ben...