Sciweavers

1251 search results - page 215 / 251
» Using Semantics for Resource Allocation in Computing Service...
Sort
View
WWW
2003
ACM
16 years 2 months ago
Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks
RDF-based P2P networks have a number of advantages compared with simpler P2P networks such as Napster, Gnutella or with approaches based on distributed indices such as CAN and CHO...
Alexander Löser, Christoph Schmitz, Ingo Brun...
JUCS
2010
213views more  JUCS 2010»
15 years 6 days ago
Mining Feature-Opinion in Online Customer Reviews for Opinion Summarization
: Online customer reviews is considered as a significant informative resource which is useful for both potential customers and product manufacturers. In web pages, the reviews are ...
Gamgarn Somprasertsri, Pattarachai Lalitrojwong
EDOC
2003
IEEE
15 years 7 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
ICPPW
2002
IEEE
15 years 6 months ago
Hierarchical Restoration Scheme for Multiple Failures in GMPLS Networks
Abstract—It is expected that GMPLS-based recovery could become a viable option for obtaining faster restoration than layer 3 rerouting. Even though dedicated restoration ensures ...
SuKyoung Lee, Chul Kim, David W. Griffith
IPPS
2005
IEEE
15 years 7 months ago
Characterizing Secure Dynamic Web Applications Scalability
Security in the access to web contents and the interaction with web sites is becoming one of the most important issues in Internet. Servers need to provide certain levels of secur...
Jordi Guitart, Vicenç Beltran, David Carrer...