Sciweavers

4051 search results - page 581 / 811
» Aggregation
Sort
View
EDBT
2010
ACM
138views Database» more  EDBT 2010»
15 years 9 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
ESWS
2010
Springer
15 years 9 months ago
Interactive Relationship Discovery via the Semantic Web
This paper presents an approach for the interactive discovery of relationships between selected elements via the Semantic Web. It emphasizes the human aspect of relationship discov...
Philipp Heim, Steffen Lohmann, Timo Stegemann
ICWE
2010
Springer
15 years 9 months ago
Scalable and Mashable Location-Oriented Web Services
Abstract. Web-based access to services increasingly moves to locationoriented scenarios, with either the client being mobile and requesting relevant information for the current loc...
Yiming Liu, Erik Wilde
CSE
2009
IEEE
15 years 9 months ago
Self-Organized Data-Energy-Aware Clustering and Routing for Wireless Sensor Networks
—In this paper we propose a clustering and routing scheme for wireless sensor networks based on a self-organizing approach. The aim of this approach is for nodes to perform an in...
Ehssan Sakhaee, Naoki Wakamiya, Masayuki Murata
SAC
2009
ACM
15 years 9 months ago
Annotating UDDI registries to support the management of composite services
The future of service-centric environments suggests that organizations will dynamically discover and utilize web services for new business processes particularly those that span m...
M. Brian Blake, Michael F. Nowlan, Ajay Bansal, Sr...