Sciweavers

2414 search results - page 427 / 483
» Reasoning Support for OWL-E
Sort
View
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 4 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
IWMM
2009
Springer
127views Hardware» more  IWMM 2009»
15 years 4 months ago
Investigating the effects of using different nursery sizing policies on performance
In this paper, we investigate the effects of using three different nursery sizing policies on overall and garbage collection performances. As part of our investigation, we modify ...
Xiaohua Guan, Witawas Srisa-an, ChengHuan Jia
SEMWEB
2009
Springer
15 years 4 months ago
Probabilistic Ontology and Knowledge Fusion for Procurement Fraud Detection in Brazil
To cope with society’s demand for transparency and corruption prevention, the Brazilian Office of the Comptroller General (CGU) has carried out a number of actions, including: aw...
Rommel N. Carvalho, Kathryn B. Laskey, Paulo Cesar...
SIGCOMM
2009
ACM
15 years 4 months ago
A programmable overlay router for service provider innovation
The threat of commoditization poses a real challenge for service providers. While the end-to-end principle is often paraphrased as “dumb network, smart end-systems”, the origi...
Bruce S. Davie, Jan Medved
CGO
2008
IEEE
15 years 4 months ago
Automatic array inlining in java virtual machines
Array inlining expands the concepts of object inlining to arrays. Groups of objects and arrays that reference each other are placed consecutively in memory so that their relative ...
Christian Wimmer, Hanspeter Mössenböck