Sciweavers

8928 search results - page 1472 / 1786
» Modeling Current Events
Sort
View
ISW
2009
Springer
15 years 11 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
144
Voted
MIDDLEWARE
2009
Springer
15 years 11 months ago
Why Do Upgrades Fail and What Can We Do about It?
Abstract. Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading ca...
Tudor Dumitras, Priya Narasimhan
OTM
2009
Springer
15 years 11 months ago
Towards a Common Platform to Support Business Processes, Services and Semantics
The search for the Holy Grail in achieving interoperability of business processes, services and semantics continues with every new type or search for the Silver Bullet. Most approa...
Baba Piprani
PKDD
2009
Springer
149views Data Mining» more  PKDD 2009»
15 years 11 months ago
Learning to Disambiguate Search Queries from Short Sessions
Web searches tend to be short and ambiguous. It is therefore not surprising that Web query disambiguation is an actively researched topic. To provide a personalized experience for ...
Lilyana Mihalkova, Raymond J. Mooney
SAGA
2009
Springer
15 years 11 months ago
Economical Caching with Stochastic Prices
In the economical caching problem, an online algorithm is given a sequence of prices for a certain commodity. The algorithm has to manage a buffer of fixed capacity over time. We...
Matthias Englert, Berthold Vöcking, Melanie W...
« Prev « First page 1472 / 1786 Last » Next »