Sciweavers

5344 search results - page 266 / 1069
» Privacy-Preserving Set Operations
Sort
View
WEBI
2005
Springer
15 years 9 months ago
Automatically Generating Labeled Examples for Web Wrapper Maintenance
In order to let software programs gain full benefit from semi-structured web sources, wrapper programs must be built to provide a “machine-readable” view over them. A signific...
Juan Raposo, Alberto Pan, Manuel Álvarez, J...
ATAL
2005
Springer
15 years 9 months ago
An autonomous performance control framework for Distributed Multi-Agent Systems: a queueing theory based approach
Distributed Multi-Agent Systems (DMAS) such as supply chains functioning in highly dynamic environments need to achieve maximum overall utility during operation. The utility from ...
Nathan Gnanasambandam, Seokcheon Lee, Soundar R. T...
DSOM
2004
Springer
15 years 9 months ago
A Formal Validation Model for the Netconf Protocol
Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate...
Sylvain Hallé, Rudy Deca, Omar Cherkaoui, R...
ESOP
2004
Springer
15 years 9 months ago
Adaptive Pattern Matching on Binary Data
Pattern matching is an important operation in functional programs. So far, pattern matching has been investigated in the context of structured terms. This paper presents an approac...
Per Gustafsson, Konstantinos F. Sagonas
GG
2004
Springer
15 years 9 months ago
Translating Java Code to Graph Transformation Systems
We propose a faithful encoding of Java programs (written in a suitable fragment of the language) to Graph Transformation Systems. Every program is translated to a set of rules incl...
Andrea Corradini, Fernando Luís Dotti, Luci...