Sciweavers

9719 search results - page 152 / 1944
» Answer Set Optimization
Sort
View
108
Voted
JWSR
2007
83views more  JWSR 2007»
15 years 21 days ago
Web Service Discovery and Composition for Virtual Enterprises
: One main characteristic of virtual enterprises are short-term collaborations between business partners to provide efficient and individualized services to customers. The MOVE pro...
Jürgen Dorn, Peter Hrastnik, Albert Rainer
116
Voted
DKE
1999
118views more  DKE 1999»
15 years 14 days ago
Designing Data Warehouses
A Data Warehouse DW is a database that collects and stores data from multiple remote and heterogeneous information sources. When a query is posed, it is evaluated locally, without...
Dimitri Theodoratos, Timos K. Sellis
114
Voted
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
15 years 5 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
ESEM
2008
ACM
15 years 2 months ago
Reducing biases in individual software effort estimations: a combining approach
Software effort estimation techniques abound, each with its own set of advantages and disadvantages, and no one proves to be the single best answer. Combining estimating is an app...
Qi Li, Qing Wang, Ye Yang, Mingshu Li
112
Voted
AMW
2009
15 years 1 months ago
Checking Containment of Schema Mappings (Preliminary Report)
In data exchange, data are materialised from a source schema to a target schema, according to suitable source-to-target constraints. Constraints are also expressed on the target sc...
Andrea Calì, Riccardo Torlone