Sciweavers

2904 search results - page 286 / 581
» Internet Infrastructure Security
Sort
View
WWW
2006
ACM
16 years 5 months ago
An integrated method for social network extraction
A social network can become bases for information infrastructure in the future. It is important to extract social networks that are not biased. Providing a simple means for users ...
Tom Hope, Takuichi Nishimura, Hideaki Takeda
WWW
2005
ACM
16 years 5 months ago
An adaptive, fast, and safe XML parser based on byte sequences memorization
XML (Extensible Markup Language) processing can incur significant runtime overhead in XML-based infrastructural middleware such as Web service application servers. This paper prop...
Toshiro Takase, Hisashi Miyashita, Toyotaro Suzumu...
ESWS
2009
Springer
15 years 11 months ago
A Context-Aware Approach for Integrating Semantic Web Technologies onto Mobile Devices
Abstract. Semantic Web technologies such as RDF are usually incorporated in the infrastructure of desktop and web applications and can currently not be entirely deployed on mobile ...
Stefan Zander
IICS
2009
Springer
15 years 11 months ago
Splitting Overlay Network for Peer-to-Peer-based Massively Multiplayer Online Games
: Massively Multiplayer Online Games (MMOGs) gradually become one of the most popular internet applications. Traditional client-server architecture is widely used in MMOGs’ deplo...
Cheng Liu, Wentong Cai
161
Voted
RULEML
2009
Springer
15 years 11 months ago
Correlating Business Events for Event-Triggered Rules
Abstract. Event processing rules may be prescribed in many different ways, including by finite state machines, graphical methods, ECA (event-conditionaction) rules or reactive rule...
Josef Schiefer, Hannes Obweger, Martin Suntinger