Sciweavers

2458 search results - page 119 / 492
» Database-Management Principles And Applications
Sort
View
WWW
2010
ACM
15 years 5 months ago
Web search/browse log mining: challenges, methods, and applications
Huge amounts of search and browse log data has been accumulated in various search engines. Such massive search/browse log data, on the one hand, provides great opportunities to mi...
Daxin Jiang, Jian Pei, Hang Li
CDC
2008
IEEE
161views Control Systems» more  CDC 2008»
15 years 4 months ago
Distributed policies for equitable partitioning: Theory and applications
Abstract— The most widely applied resource allocation strategy is to balance, or equalize, the total workload assigned to each resource. In mobile multi-agent systems, this princ...
Marco Pavone, Emilio Frazzoli, Francesco Bullo
WMCSA
2008
IEEE
15 years 4 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
ICWE
2007
Springer
15 years 4 months ago
The Challenges of Application Service Hosting
In this paper, we discuss the major issues associated with the new model of software delivery – service on demand – and explain why it alters the economics of software. As this...
Ike Nassi, Joydip Das, Ming-Chien Shan
FC
2005
Springer
119views Cryptology» more  FC 2005»
15 years 3 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva