Sciweavers

517 search results - page 88 / 104
» Web service security management using semantic web technique...
Sort
View
LREC
2010
237views Education» more  LREC 2010»
15 years 1 months ago
Entity Mention Detection using a Combination of Redundancy-Driven Classifiers
We present an experimental framework for Entity Mention Detection in which two different classifiers are combined to exploit Data Redundancy attained through the annotation of a l...
Silvana Marianela Bernaola Biggio, Manuela Speranz...
IEEECIT
2006
IEEE
15 years 5 months ago
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition
— User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of...
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee,...
ISORC
2007
IEEE
15 years 6 months ago
Device Modeling for a Flexible Embedded Systems Development Process
Methodologies, techniques and tools that currently support the embedded systems (ESs) development process prove inadequate for today’s complex ESs. Adopted traditional architect...
Kleanthis C. Thamboulidis, George S. Doukas, Giann...
SWAP
2007
15 years 27 days ago
An Approach to Decision Support in Heart Failure
Chronic heart failure is a severe clinical syndrome among the most remarkable for prevalence and morbidity in the developed western countries. The European STREP project HEARTFAID ...
Sara Colantonio, Massimo Martinelli, Davide Moroni...
ISI
2007
Springer
15 years 5 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng