Sciweavers

2092 search results - page 410 / 419
» A Theory of Non-Deterministic Networks
Sort
View
CCS
2008
ACM
13 years 10 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
ACMICEC
2008
ACM
240views ECommerce» more  ACMICEC 2008»
13 years 10 months ago
Document-oriented heterogeneous business process integration through collaborative e-marketplace
In this paper, we studied the semantic consistency maintenance issue between heterogeneous contexts, that is, how a firm business process of one e-marketplace can be transformed t...
Jingzhi Guo, Zhuo Hu, Chi-Kit Chan, Yufeng Luo, Ch...
ETVC
2008
13 years 10 months ago
Abstracts of the LIX Fall Colloquium 2008: Emerging Trends in Visual Computing
s of the LIX Fall Colloquium 2008: Emerging Trends in Visual Computing Frank Nielsen Ecole Polytechnique, Palaiseau, France Sony CSL, Tokyo, Japan Abstract. We list the abstracts o...
Frank Nielsen
ICPW
2007
13 years 10 months ago
Mind the gap!: Transcending the tunnel view on ontology engineering
The key objective of communal knowledge sharing at the scale of the World Wide Web is the ability to collaborate and integrate within and between communities. Ontologies, being fo...
Pieter De Leenheer, Stijn Christiaens
ICWSM
2010
13 years 10 months ago
Who Acquires Friends Through Social Media and Why? "Rich Get Richer" Versus "Seek and Ye Shall Find"
There is an ongoing debate, not just among academics but in popular culture, about whether social media can expand people's social networks, and whether online friends can be...
Zeynep Tufekci