Sciweavers

607 search results - page 111 / 122
» Managing Constraint Violations in Administrative Information...
Sort
View
CIKM
2008
Springer
15 years 1 months ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong
CSCWD
2001
Springer
15 years 4 months ago
Update Algorithms for the Sketch Data Model
The authors have developed a new approach to database interoperability using the sketch data model. That technique has now been used in a number of applications, but an important ...
Michael Johnson, Robert D. Rosebrugh
SECURWARE
2008
IEEE
15 years 6 months ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...
ELPUB
2006
ACM
15 years 5 months ago
Text Parsing of a Complex Genre
A text parsing component designed to be part of a system that assists students in academic reading an writing is presented. The parser can automatically add a relational discourse...
Harald Lüngen, Maja Bärenfänger, Mi...
ISPA
2004
Springer
15 years 5 months ago
Context-Awareness in Mobile Web Services
Context-aware computing is a computing paradigm in which applications can take advantage of contextual information. Quality of network connection is a very important factor for mob...
Bo Han, Weijia Jia, Ji Shen, Man-Ching Yuen