Sciweavers

2458 search results - page 119 / 492
» Database-Management Principles And Applications
Sort
View
177
Voted
WWW
2010
ACM
15 years 9 months ago
Web search/browse log mining: challenges, methods, and applications
Huge amounts of search and browse log data has been accumulated in various search engines. Such massive search/browse log data, on the one hand, provides great opportunities to mi...
Daxin Jiang, Jian Pei, Hang Li
111
Voted
CDC
2008
IEEE
161views Control Systems» more  CDC 2008»
15 years 9 months ago
Distributed policies for equitable partitioning: Theory and applications
Abstract— The most widely applied resource allocation strategy is to balance, or equalize, the total workload assigned to each resource. In mobile multi-agent systems, this princ...
Marco Pavone, Emilio Frazzoli, Francesco Bullo
WMCSA
2008
IEEE
15 years 9 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
91
Voted
ICWE
2007
Springer
15 years 8 months ago
The Challenges of Application Service Hosting
In this paper, we discuss the major issues associated with the new model of software delivery – service on demand – and explain why it alters the economics of software. As this...
Ike Nassi, Joydip Das, Ming-Chien Shan
FC
2005
Springer
119views Cryptology» more  FC 2005»
15 years 8 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva