Conference on Semantics in Text Processing最新文献

筛选
英文 中文
A Log-based Approach towards Enhanced Security in Cloud 基于日志的云安全增强方法
Conference on Semantics in Text Processing Pub Date : 2014-01-31 DOI: 10.1524/9783110358650.101
Sai Manoj Marepalli, R. Sultana, Andreas H. Christ
{"title":"A Log-based Approach towards Enhanced Security in Cloud","authors":"Sai Manoj Marepalli, R. Sultana, Andreas H. Christ","doi":"10.1524/9783110358650.101","DOIUrl":"https://doi.org/10.1524/9783110358650.101","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128339730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prozessdokumentation in kleinen und mittleren Unternehmen 小型和中型企业的文件处理
Conference on Semantics in Text Processing Pub Date : 1900-01-01 DOI: 10.1524/9783486853162.105
K. Gurr
{"title":"Prozessdokumentation in kleinen und mittleren Unternehmen","authors":"K. Gurr","doi":"10.1524/9783486853162.105","DOIUrl":"https://doi.org/10.1524/9783486853162.105","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparison of isolated Code execution approches for mobile devices 针对移动设备的独立代码执行方法的比较
Conference on Semantics in Text Processing Pub Date : 1900-01-01 DOI: 10.1524/9783110358650.143
Denis Jurkovic, F. Kaspar
{"title":"A comparison of isolated Code execution approches for mobile devices","authors":"Denis Jurkovic, F. Kaspar","doi":"10.1524/9783110358650.143","DOIUrl":"https://doi.org/10.1524/9783110358650.143","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adapting Self-Organizing Maps to the MapReduce Programming Paradigm 自组织映射适应MapReduce编程范式
Conference on Semantics in Text Processing Pub Date : 1900-01-01 DOI: 10.1524/9783486853162.119
Christian Weichel
{"title":"Adapting Self-Organizing Maps to the MapReduce Programming Paradigm","authors":"Christian Weichel","doi":"10.1524/9783486853162.119","DOIUrl":"https://doi.org/10.1524/9783486853162.119","url":null,"abstract":"We present an adaption of the self organizing map (SOM) useful for cluster analysis of large quantities of data such as music classification or customer behavior analysis. The algorithm is based on the batch SOM formulation which has been successfully adopted to other parallel architectures and perfectly suits the map reduce programming paradigm, thus enabling the use of large cloud computing infrastructures such as Amazon EC2.","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126517763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SOAP kritisch betrachtet 肥皂批评
Conference on Semantics in Text Processing Pub Date : 1900-01-01 DOI: 10.1524/9783486853162.133
H. Staudacher, Jens Lauble
{"title":"SOAP kritisch betrachtet","authors":"H. Staudacher, Jens Lauble","doi":"10.1524/9783486853162.133","DOIUrl":"https://doi.org/10.1524/9783486853162.133","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121537761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Discussion of Three Visualisation Approaches to Providing Cognitive Support in Variability Management 在变异性管理中提供认知支持的三种可视化方法的讨论
Conference on Semantics in Text Processing Pub Date : 1900-01-01 DOI: 10.1524/9783486853162.15
C. Cawley, P. Healy, Goetz Botterweck
{"title":"A Discussion of Three Visualisation Approaches to Providing Cognitive Support in Variability Management","authors":"C. Cawley, P. Healy, Goetz Botterweck","doi":"10.1524/9783486853162.15","DOIUrl":"https://doi.org/10.1524/9783486853162.15","url":null,"abstract":"Variability management in software intensive systems can be a complex and cognitively challenging process. Configuring a Software Product Line with thousands of variation points in order to derive a specific product variant is an example of such a challenge. Each configurable feature can have numerous relationships with many other elements within the system. These relationships can impact greatly on the overall configuration process. Understanding the nature and impact of these relationships during configuration is key to the quality and efficiency of the configuration process. In this paper we present an overview of three visual approaches to this configuration which utilise information visualisation techniques and aspects of cognitive theory to provide stakeholder support. Using an industry example, we discuss and compare the approaches using a set of fundamental configuration tasks.","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133904990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Developing Secure Web Applications with OWASP Resources 使用OWASP资源开发安全的Web应用程序
Conference on Semantics in Text Processing Pub Date : 1900-01-01 DOI: 10.1524/9783486853162.87
Martin Knobloch
{"title":"Developing Secure Web Applications with OWASP Resources","authors":"Martin Knobloch","doi":"10.1524/9783486853162.87","DOIUrl":"https://doi.org/10.1524/9783486853162.87","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125315813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penetrationtesting mit Windows Credential Editor 渗透测试mit Windows凭证编辑器
Conference on Semantics in Text Processing Pub Date : 1900-01-01 DOI: 10.1524/9783110358650.49
B. Nopper
{"title":"Penetrationtesting mit Windows Credential Editor","authors":"B. Nopper","doi":"10.1524/9783110358650.49","DOIUrl":"https://doi.org/10.1524/9783110358650.49","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125878938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Datenschutz: Ein Auslaufmodell? 资料保密?
Conference on Semantics in Text Processing Pub Date : 1900-01-01 DOI: 10.1524/9783110358650.3
G. Müller
{"title":"Datenschutz: Ein Auslaufmodell?","authors":"G. Müller","doi":"10.1524/9783110358650.3","DOIUrl":"https://doi.org/10.1524/9783110358650.3","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131096971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Architectural Approach For Autonomous Agents To Monitor Huge Infrastructures 自主代理监控大型基础设施的体系结构方法
Conference on Semantics in Text Processing Pub Date : 1900-01-01 DOI: 10.1524/9783110358650.59
Dirk Hölscher
{"title":"An Architectural Approach For Autonomous Agents To Monitor Huge Infrastructures","authors":"Dirk Hölscher","doi":"10.1524/9783110358650.59","DOIUrl":"https://doi.org/10.1524/9783110358650.59","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116838920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信