Sciweavers

8468 search results - page 1404 / 1694
» The Technology of Data Stashing
Sort
View
BERTINORO
2005
Springer
15 years 4 months ago
Design and Analysis of a Bio-inspired Search Algorithm for Peer to Peer Networks
Decentralized peer to peer (p2p) networks like Gnutella are attractive for certain applications because they require no centralized directories and no precise control over network ...
Niloy Ganguly, Lutz Brusch, Andreas Deutsch
CAISE
2005
Springer
15 years 4 months ago
Building Self-Managing Web Information Systems from Generic Components
Abstract. The increasing need for device independence and personalization forces organizations to automatically adapt their Web Information Systems (WISs) to individual users and t...
Geert-Jan Houben, Zoltán Fiala, Kees van de...
CAISE
2005
Springer
15 years 4 months ago
Query Processing Using Ontologies
Abstract. Recently, the database and AI research communities have paid increased attention to ontologies. The main motivating reason is that ontologies promise solutions for comple...
Chokri Ben Necib, Johann Christoph Freytag
CIKM
2005
Springer
15 years 4 months ago
Interconnection semantics for keyword search in XML
A framework for describing semantic relationships among nodes in XML documents is presented. In contrast to earlier work, the XML documents may have ID references (i.e., they corr...
Sara Cohen, Yaron Kanza, Benny Kimelfeld, Yehoshua...
CIKM
2005
Springer
15 years 4 months ago
The case for access control on XML relationships
With the emergence of XML as the de facto standard to exchange and disseminate information, the problem of regulating access to XML documents has attracted a considerable attentio...
Béatrice Finance, Saïda Medjdoub, Phil...
« Prev « First page 1404 / 1694 Last » Next »