Sciweavers

1829 search results - page 282 / 366
» aims 2008
Sort
View
ESORICS
2008
Springer
15 years 1 months ago
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms
The rapid expansion of Internet based services has created opportunities for ICT firms to collect and use, in an unauthorized way, information about individuals (e.g. customers, pa...
Athanassios N. Yannacopoulos, Costas Lambrinoudaki...
ESWS
2008
Springer
15 years 1 months ago
WSMO Choreography: From Abstract State Machines to Concurrent Transaction Logic
tract State Machines to Concurrent Transaction Logic Dumitru Roman1 , Michael Kifer2 , and Dieter Fensel1 1 STI Innsbruck, Austria 2 State University of New York at Stony Brook, US...
Dumitru Roman, Michael Kifer, Dieter Fensel
ESWS
2008
Springer
15 years 1 months ago
Q2Semantic: A Lightweight Keyword Interface to Semantic Search
The increasing amount of data on the Semantic Web offers opportunities for semantic search. However, formal query hinders the casual users in expressing their information need as t...
Haofen Wang, Kang Zhang, Qiaoling Liu, Thanh Tran,...
ETFA
2008
IEEE
15 years 1 months ago
Is CSMA/CA really efficient against interference in a wireless control system? An experimental answer
The deployment of a wireless control system must cope with a number of effects usually negligible in a wired scenario. To this aim, an experimental analysis on suitable prototypes...
Matteo Bertocco, Giovanni Gamba, Alessandro Sona
EUROPAR
2008
Springer
15 years 1 months ago
Empirical Analysis of a Large-Scale Hierarchical Storage System
To prepare for future peta- or exa-scale computing, it is important to gain a good understanding on what impacts a hierarchical storage system would have on the performance of data...
Weikuan Yu, Sarp Oral, Shane Canon, Jeffrey S. Vet...