Sciweavers

1466 search results - page 251 / 294
» Evaluation Issues in Autonomic Computing
Sort
View
ICDE
2010
IEEE
428views Database» more  ICDE 2010»
15 years 9 months ago
Supporting Top-K Keyword Search in XML Databases
Keyword search is considered to be an effective information discovery method for both structured and semistructured data. In XML keyword search, query semantics is based on the con...
Liang Jeff Chen, Yannis Papakonstantinou
IWCMC
2006
ACM
15 years 3 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
EDBT
2010
ACM
152views Database» more  EDBT 2010»
15 years 1 months ago
Feedback-based annotation, selection and refinement of schema mappings for dataspaces
The specification of schema mappings has proved to be time and resource consuming, and has been recognized as a critical bottleneck to the large scale deployment of data integrati...
Khalid Belhajjame, Norman W. Paton, Suzanne M. Emb...
ISSA
2004
14 years 11 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
TASE
2008
IEEE
14 years 9 months ago
Stochastic Modeling of an Automated Guided Vehicle System With One Vehicle and a Closed-Loop Path
Abstract--The use of automated guided vehicles (AGVs) in material-handling processes of manufacturing facilities and warehouses isbecomingincreasinglycommon.AcriticaldrawbackofanAG...
Aykut F. Kahraman, Abhijit Gosavi, Karla J. Oty