Sciweavers

3555 search results - page 569 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
WWW
2004
ACM
16 years 4 months ago
A semantic matchmaker service on the grid
A fundamental task on the Grid is to decide what jobs to run on what computing resources based on job or application requirements. Our previous work on ontology-based matchmaking ...
Andreas Harth, Stefan Decker, Yu He, Hongsuda Tang...
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
16 years 4 months ago
High-performance complex event processing over streams
In this paper, we present the design, implementation, and evaluation of a system that executes complex event queries over real-time streams of RFID readings encoded as events. The...
Eugene Wu 0002, Yanlei Diao, Shariq Rizvi
ICTAI
2007
IEEE
15 years 10 months ago
Constructing VEGGIE: Machine Learning for Context-Sensitive Graph Grammars
Context-sensitive graph grammar construction tools have been used to develop and study interesting languages. However, the high dimensionality of graph grammars result in costly e...
Keven Ates, Kang Zhang
COMSWARE
2006
IEEE
15 years 10 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...
DBPL
2003
Springer
144views Database» more  DBPL 2003»
15 years 9 months ago
A General Framework for Estimating XML Query Cardinality
Abstract. In the context of XML data management systems, the estimation of query cardinality is becoming more and more important: the information provided by a query result estimat...
Carlo Sartiani