Sciweavers

3544 search results - page 631 / 709
» Information Security in Open Systems
Sort
View
EUSFLAT
2007
156views Fuzzy Logic» more  EUSFLAT 2007»
15 years 14 days ago
Fuzzy Calculating and Fuzzy Control in Wireless Sensor Network
At present time configurable wireless sensor networks are given special consideration. Wireless sensor networks are now a static elements union. To make such a network a powerful ...
Irina Kalganova
CLIMA
2004
15 years 13 days ago
A New Framework for Knowledge Revision of Abductive Agents Through Their Interaction
The aim of this work is the design of a framework for the revision of knowledge in abductive reasoning agents, based on interaction. We address issues such as: how to exploit knowl...
Andrea Bracciali, Paolo Torroni
SIGMOD
2012
ACM
230views Database» more  SIGMOD 2012»
13 years 1 months ago
Pay-as-you-go data integration for linked data: opportunities, challenges and architectures
Linked Data (LD) provides principles for publishing data that underpin the development of an emerging web of data. LD follows the web in providing low barriers to entry: publisher...
Norman W. Paton, Klitos Christodoulou, Alvaro A. A...
78
Voted
CIKM
2005
Springer
15 years 4 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
WWW
2002
ACM
15 years 11 months ago
A machine learning based approach for table detection on the web
Table is a commonly used presentation scheme, especially for describing relational information. However, table understanding remains an open problem. In this paper, we consider th...
Yalin Wang, Jianying Hu