Sciweavers

966 search results - page 167 / 194
» Integrating and Exchanging XML Data Using Ontologies
Sort
View
111
Voted
SPW
2004
Springer
15 years 9 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
RTSS
2008
IEEE
15 years 10 months ago
A Holistic Approach to Decentralized Structural Damage Localization Using Wireless Sensor Networks
Wireless sensor networks (WSNs) have become an increasingly compelling platform for Structural Health Monitoring (SHM) applications, since they can be installed relatively inexpen...
Gregory Hackmann, Fei Sun, Nestor Castaneda, Cheny...
167
Voted
ICDT
2012
ACM
251views Database» more  ICDT 2012»
13 years 6 months ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
OTM
2010
Springer
15 years 2 months ago
Semantic Support for Computer-Human Interaction: Intuitive 3DVirtual Tools for Surface Deformation in CAD
Decision making is tightly related to the understanding of the design and manufacturing practices. In our previous work, we proposed an intuitive approach for geometric modeling in...
Ioana Ciuciu, Robert Meersman, Estelle Perrin, Fr&...
NAR
2006
64views more  NAR 2006»
15 years 3 months ago
The PeptideAtlas project
The completion of the sequencing of the human genome and the concurrent, rapid development of high-throughput proteomic methods have resulted in an increasing need for automated a...
Frank Desiere, Eric W. Deutsch, Nichole L. King, A...