Sciweavers

1976 search results - page 242 / 396
» Application Semiotics Engineering Process
Sort
View
133
Voted
WS
2010
ACM
15 years 2 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
151
Voted
DMIN
2009
180views Data Mining» more  DMIN 2009»
15 years 1 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
128
Voted
TON
2010
139views more  TON 2010»
14 years 10 months ago
KISS: Stochastic Packet Inspection Classifier for UDP Traffic
Abstract--This paper proposes KISS, a novel Internet classification engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applicati...
Aleaandro Finamore, Marco Mellia, Michela Meo, Dar...
134
Voted
AOSD
2007
ACM
15 years 7 months ago
An aspect-oriented approach to bypassing middleware layers
The layered architecture of middleware platforms (such as CORBA, SOAP, J2EE) is a mixed blessing. On the one hand, layers provide services such as demarshaling, session management...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
139
Voted
ACMICEC
2004
ACM
171views ECommerce» more  ACMICEC 2004»
15 years 9 months ago
Efficient integration of web services with distributed data flow and active mediation
This paper presents a loosely coupled service-composition paradigm. This paradigm employs a distributed data flow that differs markedly from centralized information flow adopted b...
David Liu, Jun Peng, Kincho H. Law, Gio Wiederhold