Sciweavers

87 search results - page 5 / 18
» Adding Integrity Constraints to OWL
Sort
View
78
Voted
SEMWEB
2009
Springer
15 years 4 months ago
Semantically-Aided Business Process Modeling
Enriching business process models with semantic annotations taken from an ontology has become a crucial necessity both in service provisioning, integration and composition, and in ...
Chiara Di Francescomarino, Chiara Ghidini, Marco R...
MMSEC
2004
ACM
121views Multimedia» more  MMSEC 2004»
15 years 3 months ago
Counteracting Oracle attacks
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counte...
Ilaria Venturini
SOCO
2005
Springer
15 years 3 months ago
Ad Hoc Composition of User Tasks in Pervasive Computing Environments
Due to the large success of wireless networks and portable devices, the pervasive computing paradigm is becoming a reality. One of the most challenging objectives to be achieved in...
Sonia Ben Mokhtar, Nikolaos Georgantas, Valé...
SODA
2012
ACM
217views Algorithms» more  SODA 2012»
13 years 1 days ago
Polynomial integrality gaps for strong SDP relaxations of Densest k-subgraph
The Densest k-subgraph problem (i.e. find a size k subgraph with maximum number of edges), is one of the notorious problems in approximation algorithms. There is a significant g...
Aditya Bhaskara, Moses Charikar, Aravindan Vijayar...
ICSOC
2009
Springer
14 years 7 months ago
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to ...
Weishan Zhang, Julian Schütte, Mads Ingstrup,...