Sciweavers

42 search results - page 2 / 9
» tkde 2010
Sort
View
TKDE
2010
160views more  TKDE 2010»
13 years 3 months ago
Using Proximity Search to Estimate Authority Flow
—Authority flow and proximity search have been used extensively in measuring the association between entities in data graphs, ranging from the Web to relational and XML database...
Vagelis Hristidis, Yannis Papakonstantinou, Ramakr...
TKDE
2010
135views more  TKDE 2010»
13 years 3 months ago
A Rule-Based Trust Negotiation System
—Open distributed environments such as the World Wide Web facilitate information sharing but provide limited support to the protection of sensitive information and resources. Tru...
Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedil...
TKDE
2010
370views more  TKDE 2010»
13 years 3 months ago
Anonymous Query Processing in Road Networks
—The increasing availability of location-aware mobile devices has given rise to a flurry of location-based services (LBS). Due to the nature of spatial queries, an LBS needs the...
Kyriakos Mouratidis, Man Lung Yiu
TKDE
2010
210views more  TKDE 2010»
13 years 3 months ago
Structural and Role-Oriented Web Service Discovery with Taxonomies in OWL-S
—In this paper, we describe and evaluate a Web service discovery framework using OWL-S advertisements, combined with the distinction between service and Web service of the WSMO D...
Georgios Meditskos, Nick Bassiliades
TKDE
2010
272views more  TKDE 2010»
13 years 3 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta