Sciweavers

17 search results - page 3 / 4
» Modeling and Evaluating the Survivability of an Intrusion To...
Sort
View
EJC
2010
13 years 1 months ago
Inferencing in Database Semantics
As a computational model of natural language communication, Database Semantics1 (DBS) includes a hearer mode and a speaker mode. For the content to be mapped into language expressi...
Roland Hausser
TC
2010
13 years 4 months ago
The Design and Evaluation of a Self-Organizing Superpeer Network
—Superpeer architectures exploit the heterogeneity of nodes in a peer-to-peer (P2P) network by assigning additional responsibilities to higher capacity nodes. In the design of a ...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
VLDB
2012
ACM
360views Database» more  VLDB 2012»
12 years 1 months ago
An adaptive updating protocol for reducing moving object database workload
In the last decade, spatio-temporal database research focuses on the design of effective and efficient indexing structures in support of location-based queries such as predictive...
Su Chen, Beng Chin Ooi, Zhenjie Zhang
ICSE
2007
IEEE-ACM
14 years 6 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
SIGMOD
2002
ACM
127views Database» more  SIGMOD 2002»
13 years 5 months ago
Workflow management with service quality guarantees
Workflow management systems (WFMS) that are geared for the orchestration of business processes across multiple organizations are complex distributed systems: they consist of multi...
Michael Gillmann, Gerhard Weikum, Wolfgang Wonner