Sciweavers

2586 search results - page 501 / 518
» Automatic Abstraction for Congruences
Sort
View
BPSC
2009
184views Business» more  BPSC 2009»
14 years 10 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
ICARIS
2010
Springer
14 years 10 months ago
Biomedical Article Classification Using an Agent-Based Model of T-Cell Cross-Regulation
Abstract. We propose a novel bio-inspired solution for biomedical article classification. Our method draws from an existing model of T-cell cross-regulation in the vertebrate immun...
Alaa Abi-Haidar, Luis Mateus Rocha
ICDE
2010
IEEE
189views Database» more  ICDE 2010»
14 years 9 months ago
Caching all plans with just one optimizer call
Abstract— Modern database management systems (DBMS) answer a multitude of complex queries on increasingly larger datasets. Given the complexities of the queries and the numerous ...
Debabrata Dash, Ioannis Alagiannis, Cristina Maier...
ICDE
2010
IEEE
266views Database» more  ICDE 2010»
14 years 9 months ago
Ranking for data repairs
Abstract— Improving data quality is a time-consuming, laborintensive and often domain specific operation. A recent principled approach for repairing dirty database is to use dat...
Mohamed Yakout, Ahmed K. Elmagarmid, Jennifer Nevi...
ADHOC
2007
144views more  ADHOC 2007»
14 years 9 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac