Sciweavers

4201 search results - page 694 / 841
» Interaction graphs: Additives
Sort
View
133
Voted
DEBU
2007
141views more  DEBU 2007»
15 years 4 months ago
Issues in Building Practical Provenance Systems
The importance of maintaining provenance has been widely recognized, particularly with respect to highly-manipulated data. However, there are few deployed databases that provide p...
Adriane Chapman, H. V. Jagadish
151
Voted
JSW
2008
136views more  JSW 2008»
15 years 4 months ago
Collaborative Product Configuration: Formalization and Efficient Algorithms for Dependency Analysis
- In the Software Product Line approach, product configuration is a key activity in which stakeholders choose features for a product. This activity is critical in the sense that ca...
Marcílio Mendonça, Donald D. Cowan, ...
DSS
2007
111views more  DSS 2007»
15 years 4 months ago
Applying question answering technology to locating malevolent online content
We have empirically compared two classes of technologies capable of locating potentially malevolent online content: 1) popular keyword searching, currently widely used by law enfo...
Dmitri Roussinov, Jose Antonio Robles-Flores
JWSR
2008
145views more  JWSR 2008»
15 years 4 months ago
An Access-Control Framework for WS-BPEL
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Federica Paci, Elisa Bertino, Jason Crampton
140
Voted
JSAC
2006
139views more  JSAC 2006»
15 years 4 months ago
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable and effective solution to ubiquitous broadband Internet access. This paper addresses the secu...
Yanchao Zhang, Yuguang Fang