Sciweavers

1013 search results - page 105 / 203
» Conceptual modeling of XML data
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
14 years 10 months ago
Personality Trait Based Simulation Model of the E-mail System
Within the area of criminal and terrorist social network analysis, there is little research being done on analysing the communication behavior of criminal and terrorist groups. In...
Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hart...
PODS
2005
ACM
119views Database» more  PODS 2005»
15 years 10 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
BSN
2006
IEEE
131views Sensor Networks» more  BSN 2006»
15 years 4 months ago
Elaborating Sensor Data using Temporal and Spatial Commonsense Reasoning
Ubiquitous computing has established a vision of computation where computers are so deeply integrated into our lives that they become both invisible and everywhere. In order to ha...
Bo Morgan, Push Singh
DEXA
2003
Springer
135views Database» more  DEXA 2003»
15 years 3 months ago
On the Optimality of Holistic Algorithms for Twig Queries
Streaming XML documents has many emerging applications. However, in this paper, we show that the restrictions imposed by data streaming are too restrictive for processing twig quer...
Byron Choi, Malika Mahoui, Derick Wood
COMPSAC
2008
IEEE
15 years 4 months ago
Utilising Located Functions to Model and Optimise Distributed Computations
With developments in Grid computing and Web based data storage the task of orchestrating computations is becoming ever more difficult. Identifying which of the available computati...
Stephen Crouch, Peter Henderson, Robert John Walte...