Search

Showing total 1,570 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic computer.software_genre Remove constraint Topic: computer.software_genre Publisher springer us Remove constraint Publisher: springer us
1,570 results

Search Results

101. Selecting the Appropriate Machine Learning Techniques for the Prediction of Software Development Costs

102. Engineering an interoperable adaptive hypermedia testing tool supporting user adaptable strategies

103. Developing Personalized E-Books: A Multi-Layered Approach

104. Retrieving Open Source Software Licenses

105. Learning context models for the recognition of scenarios

106. Retraining the Neural Network for Data Visualization

107. MDA-Based Architecture of a Description Logics Reasoner

108. An integrated classification model for incremental learning

109. Adapting SLP To Ad-Hoc Environment

110. Industrial Application Integration Using Agent-Enabled Sematic SOA: Capnet Case Study

111. Beyond Low-Hanging Fruit: Seeking the Next Generation in FLOSS Data Mining

112. Knowledge Modelling Using The UML Profile

113. Understanding Meaning and Bridging Divides: The Use of an African Metaphor for the South African Open Source Center

114. Evaluating Classifiers for Mobile-Masquerader Detection

115. Post Sequential Patterns Mining

116. Inviting New Players to the Multimedia M-Commerce Arena

117. Dynamic Security Labels and Noninterference (Extended Abstract)

118. Using Data Mining for Virtual Enterprise Management

119. A Responsibility Framework for Information Security

120. Threat Modelling for Security Tokens in Web Applications

121. Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks

122. Assignment of Security Clearances in an Organization

123. Schema Based XML Security: RBAC Approach

124. Secure Authorisation for Web Services

125. A Survey on Fault Attacks

126. Evolutionary Robot Behaviors Based on Natural Selection and Neural Network

127. Integrating Two Artificial Intelligence Theories in a Medical Diagnosis Application

128. Use of Models and Modelling Techniques for Service Development

129. An Asymmetric Cryptography Secure Channel Protocol for Smart Cards

130. Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics

131. Composing Web Services Using an Agent Factory

132. On the Era of Educational Hypermedia Computing

133. Adapting Query Optimization Techniques for Efficient Alert Correlation

134. Managing Heterogeneous Services and Devices with the Device Unifying Service

135. A Distributed Policy Approach in Support of Multimedia Session Establishment

136. Information Security: Auditing the Behaviour of the Employee

137. The Technoludic Film:Images of Video Games in Movies (1973–2001)

138. Ubiquitous Access to Personalised Services

139. Development of multimedia animations — a contribution of informatics teaching to media studies

140. Content Management in Mixed Reality Systems

141. Teaching Network Security through Live Exercises

142. Usability and Playability Issues for Arquake

143. Enhancing collaboration through web enabled performance measurement system

144. Teacher in the Mobile World

145. Role Delegation for a Resource-Based Security Model

146. Prioritized Buffer Management in Photonic Packet Switches for Diffserv Assured Forwarding

147. A policy-based approach to firewall management

148. On Security and Privacy Risks in Association Mining Algorithms

149. Security Education for Times of Netwar and Peace

150. Multiple moderator meta-analysis using the R-package Meta-CART