Sciweavers

3984 search results - page 713 / 797
» Using linked data for systems management
Sort
View
NSPW
2003
ACM
15 years 3 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
DELTA
2004
IEEE
15 years 1 months ago
A Novel Approach to Real-time Bilinear Interpolation
Bilinear interpolation is often used to improve image quality after performing spatial transformation operations such as digital zooming or rotation. In the traditional case where...
K. T. Gribbon, Donald G. Bailey
OWLED
2008
14 years 11 months ago
Opening, Closing Worlds - On Integrity Constraints
In many data-centric applications it is desirable to use OWL as an expressive schema language where one expresses constraints that need to be satisfied by the (instance) data. Howe...
Evren Sirin, Michael Smith, Evan Wallace
CORR
2007
Springer
138views Education» more  CORR 2007»
14 years 10 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
ADC
2010
Springer
210views Database» more  ADC 2010»
14 years 5 months ago
Towards unifying advances in twig join algorithms
Twig joins are key building blocks in current XML indexing systems, and numerous algorithms and useful data structures have been introduced. We give a structured, qualitative anal...
Nils Grimsmo, Truls Amundsen Bjørklund