Sciweavers

3260 search results - page 205 / 652
» Lightweight linked data
Sort
View
154
Voted
DBKDA
2009
IEEE
238views Database» more  DBKDA 2009»
15 years 7 months ago
MyMIDP: An JDBC Driver for Accessing MySQL from Mobile Devices
Cell phones are no longer merely used to make phone calls or to send short or multimedia messages. They more and more become information systems clients. Recent developments in th...
Hagen Höpfner, Jörg Schad, Sebastian Wen...
174
Voted
DOCENG
2008
ACM
15 years 5 months ago
A concise XML binding framework facilitates practical object-oriented document engineering
Semantic web researchers tend to assume that XML Schema and OWL-S are the correct means for representing the types, structure, and semantics of XML data used for documents and int...
Andruid Kerne, Zachary O. Toups, Blake Dworaczyk, ...
129
Voted
DBSEC
2001
115views Database» more  DBSEC 2001»
15 years 5 months ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
139
Voted
HPDC
2008
IEEE
15 years 3 months ago
Eliminating the middleman: peer-to-peer dataflow
Efficiently executing large-scale, data-intensive workflows such as Montage must take into account the volume and pattern of communication. When orchestrating data-centric workflo...
Adam Barker, Jon B. Weissman, Jano I. van Hemert
126
Voted
CORR
2010
Springer
176views Education» more  CORR 2010»
15 years 3 months ago
Network Traffic Anomalies Detection and Identification with Flow Monitoring
Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. R...
Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokj...