Sciweavers

423 search results - page 61 / 85
» An Efficient and Scalable Management of Ontology
Sort
View
ISI
2004
Springer
15 years 7 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
PDP
2010
IEEE
15 years 6 months ago
Distributed Scheduler of Workflows with Deadlines in a P2P Desktop Grid
Scheduling large amounts of tasks in distributed computing platforms composed of millions of nodes is a challenging goal, even more in a fully decentralized way and with low overhe...
Javier Celaya, Unai Arronategui
CIKM
2008
Springer
15 years 3 months ago
Scaling up duplicate detection in graph data
Duplicate detection determines different representations of realworld objects in a database. Recent research has considered the use of relationships among object representations t...
Melanie Herschel, Felix Naumann
APPINF
2003
15 years 3 months ago
Extracting High-level Architecture from Existing Code with Summary Models
Evolution of existing large telecommunications software currently became an important issue. Efficient methods are needed to componentize existing software identify existing compo...
Nikolai Mansurov, Djenana Campara
105
Voted
TMC
2008
112views more  TMC 2008»
15 years 1 months ago
Location-Based Spatial Query Processing in Wireless Broadcast Environments
Location-based spatial queries (LBSQs) refer to spatial queries whose answers rely on the location of the inquirer. Efficient processing of LBSQs is of critical importance with the...
Wei-Shinn Ku, Roger Zimmermann, Haixun Wang