Sciweavers

5470 search results - page 239 / 1094
» Enterprise Information Architecture
Sort
View
CIKM
2011
Springer
14 years 1 months ago
Joint inference for cross-document information extraction
Previous information extraction (IE) systems are typically organized as a pipeline architecture of separated stages which make independent local decisions. When the data grows bey...
Qi Li, Sam Anzaroot, Wen-Pin Lin, Xiang Li, Heng J...
ASPLOS
2009
ACM
16 years 2 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
PERCOM
2005
ACM
16 years 1 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
EGC
2005
Springer
15 years 7 months ago
Fault Tolerance in the R-GMA Information and Monitoring System
R-GMA (Relational Grid Monitoring Architecture) [1] is a grid monitoring and information system that provides a global view of data distributed across a grid system. R-GMA creates ...
Rob Byrom, Brian A. Coghlan, Andrew W. Cooke, Rone...
HICSS
2003
IEEE
128views Biometrics» more  HICSS 2003»
15 years 7 months ago
IRTL (Information Resource Transaction Layer) Middleware Design for P2P and Open GRID Services
In this paper we present an IRTL (Information Resource Transaction Layer) middleware architecture that addresses some of the important technical challenges associated with heterog...
Junseok Hwang, Praveen Aravamudham, Elizabeth D. L...