Sciweavers

1993 search results - page 266 / 399
» Data integration with dependent sources
Sort
View
ACSAC
2006
IEEE
15 years 4 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
WCRE
1995
IEEE
15 years 1 months ago
Pattern Matching for Design Concept Localization
A legacy system is an operational, large-scale software system that is maintained beyond its first generation of programmers. It typically represents a massive economic investmen...
Kostas Kontogiannis, Renato de Mori, Morris Bernst...
CIKM
2005
Springer
15 years 3 months ago
The case for access control on XML relationships
With the emergence of XML as the de facto standard to exchange and disseminate information, the problem of regulating access to XML documents has attracted a considerable attentio...
Béatrice Finance, Saïda Medjdoub, Phil...
EEE
2004
IEEE
15 years 1 months ago
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective
e-Transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that int...
William Kwok-Wai Cheung
IJSWIS
2007
96views more  IJSWIS 2007»
14 years 9 months ago
An Incremental Method for the Lexical Annotation of Domain Ontologies
In this paper, we present MELIS (Meaning Elicitation and Lexical Integration System), a method and a software tool for enabling an incremental process of automatic annotation of lo...
Sonia Bergamaschi, Paolo Bouquet, Daniel Giacomuzz...