Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Basic similarities among the several service-registry standards that exist today suggest the potential for interoperability. Given that service registries are key components inWeb services architectures, interoperability will play an... more
    • by 
    •   4  
      Distributed ComputingWeb ServiceIEEE Internet ComputingBusiness to Business
    • by 
    •   9  
      Distributed ComputingOntologySemantic WebWeb
    • by 
    •   20  
      Distributed ComputingInformation TechnologyDecision MakingSystem Management
    • by 
    •   9  
      Computational IntelligenceDecision support systemMulti Agent SystemsNatural language interface
    • by 
    •   7  
      Knowledge RepresentationIEEELearning ObjectKnowledge Extraction
    • by 
    •   11  
      Distributed ComputingWeb EngineeringUser InterfaceRIch Internet Applications
    • by 
    •   13  
      Distributed ComputingSemanticsData AnalysisContent Analysis
... Nick Pope • Security & Standards Associates Juan Carlos Cruellas • Universitat Politècnica de Catalunya Page 2. What Does Oasis DSS Do? ... The user sends a request through a secure chan-nel for the server to verify the signed... more
    • by 
    •   5  
      Distributed ComputingDigital SignaturePublic Key InfrastructureKey Management
Shape matching is one of the main research procedures performed by archaeologists. Real time 3D computer graphics, 3D digitisation and content based retrieval are technologies that can facilitate the automation of the shape matching... more
    • by 
    •   12  
      ArchaeologySearch EnginesVirtual RealitySearch Engine
    • by 
    •   9  
      Distributed ComputingPacket SwitchingInternet Routing ProtocolReverse Engineering
    • by 
    •   12  
      Distributed ComputingSemanticsSocial NetworkingSemantic Web
    • by 
    •   9  
      Computer ScienceDistributed ComputingWeb DevelopmentInterdisciplinary research
Most user interfaces use color, which can greatly enhance their design. Because the use of color is typically a usability issue, it rarely causes security failures. However, using color when designing CAPTCHAs, a standard security... more
    • by 
    •   15  
      Computer ScienceDistributed ComputingUsabilityCharacter Recognition
    • by 
    •   7  
      Natural Language ProcessingLanguageFree SoftwareWord order
    • by 
    •   7  
      Distributed ComputingCloud ComputingInternet ComputingInfrastructure as a service
    • by 
    •   5  
      Distributed ComputingInformation RetrievalWeb CachingIEEE Internet Computing
    • by 
    •   8  
      Distributed ComputingDistributed SystemCloud ComputingOpen Source
    • by 
    •   7  
      Distributed ComputingTrust ManagementPublic key cryptographyAuthorisation
    • by 
    •   2  
      Distributed ComputingIEEE Internet Computing
    • by 
    •   11  
      Distributed ComputingMultihomingInternet ComputingPipe Flow
    • by 
    • IEEE Internet Computing
    • by 
    •   13  
      Distributed ComputingSchedulingVirtual MachinesDistributed System
    • by 
    •   3  
      Computer ScienceDistributed ComputingIEEE Internet Computing
    • by 
    •   5  
      Distributed ComputingVirtual WorldsVirtual RealityIEEE Internet Computing
    • by 
    •   6  
      Distributed ComputingRegulationsInternet UsageIEEE Internet Computing
    • by 
    •   11  
      Distributed ComputingObject Oriented ProgrammingHuman Computer InteractionVirtual Worlds
    • by 
    •   9  
      Distributed ComputingInformation RetrievalGenetic AlgorithmsWeb search
    • by 
    •   11  
      Distributed ComputingFuzzy LogicPublic DomainComputers
    • by  and +1
    •   6  
      Distributed ComputingData StructureBloom FilterData Integrity
    • by 
    •   10  
      Information FilteringLearning resourceKnowledge RepresentationCluster Analysis
    • by 
    •   12  
      Image ProcessingImage AnalysisUser eXperienceImage segmentation
    • by 
    •   13  
      Distributed ComputingContent ManagementContent Delivery NetworkNetwork Performance
In this paper, we propose a Progressive Differential Thresholding (PDT) framework for coordinated network anomaly detection. Under the proposed framework, nodes present on a packet's path progressively encode their opinion (malicious or... more
    • by 
    •   11  
      Computational ComplexityComplexity TheoryAnomaly DetectionSpatial Distribution
    • by 
    •   10  
      Distributed ComputingAccess To InformationDatabase Management SystemsData Structure
    • by 
    •   9  
      Distributed ComputingLearning TechnologyWeb Based LearningLearning Object
It is well known that software is a powerful tool for circuit simulation and analysis, conceived to verify electronic systems. However, some kind of analyses may not be completed with only one software suit, due to the nature of the... more
    • by 
    •   7  
      Gas SensorCircuit simulationCircuit DesignOperant Conditioning
The IP multimedia subsystem (IMS) defines a generic architecture to support communication services over a Session Initiation Protocol (SIP) infrastructure. In the IMS architecture, application servers host and execute the IMS service... more
    • by 
    •   9  
      Distributed ComputingVoice over IPIP Multimedia SubsystemSession Initiation Protocol
    • by 
    •   9  
      Computer ScienceRelational DatabaseOpen Source SoftwareOpen Source
    • by 
    •   13  
      Distributed ComputingModelingSoftware ArchitectureWeb Services
    • by 
    •   19  
      Distributed ComputingAdaptive HypermediaService Oriented ArchitectureSocial Interaction
    • by 
    •   4  
      Distributed ComputingNetwork ArchitectureIEEE Internet ComputingInternet
    • by 
    •   6  
      Distributed ComputingXMLDatabase indexingQuery processing
    • by  and +1
    •   9  
      Distributed ComputingKnowledge ManagementInformation ManagementInformation Processing
    • by 
    •   4  
      Computer ScienceDistributed ComputingIEEE Internet ComputingSlicing