Sciweavers

3220 search results - page 594 / 644
» Constrained Graph Processes
Sort
View
108
Voted
JSW
2008
167views more  JSW 2008»
15 years 2 months ago
An Approach to Discover Dependencies between Service Operations
Service composition is emerging as an important paradigm for constructing distributed applications by combining and reusing independently developed component services. One key issu...
Shuying Yan, Jing Wang 0002, Chen Liu, Lei Liu
119
Voted
KAIS
2008
109views more  KAIS 2008»
15 years 2 months ago
Knowledge-empowered automated negotiation system for e-Commerce
This paper focuses on knowledge empowered automated negotiation systems for buyer-centric multi-bilateral multi-attribute e-Procurement. We propose two knowledge empowered models,...
Zhuang Yan, Simon Fong, Meilin Shi
JSAC
2006
111views more  JSAC 2006»
15 years 2 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
KES
2006
Springer
15 years 2 months ago
Integrated Document Browsing and Data Acquisition for Building Large Ontologies
Named entities (e.g., "Kofi Annan", "Coca-Cola", "Second World War") are ubiquitous in web pages and other types of document and often provide a simpl...
Felix Weigel, Klaus U. Schulz, Levin Brunner, Edua...
114
Voted
MONET
2006
107views more  MONET 2006»
15 years 2 months ago
Utilization and fairness in spectrum assignment for opportunistic spectrum access
The Open Spectrum approach to spectrum access can achieve near-optimal utilization by allowing devices to sense and utilize available spectrum opportunistically. However, a naive d...
Chunyi Peng, Haitao Zheng, Ben Y. Zhao