Sciweavers

128 search results - page 12 / 26
» A Unifying Framework for Merging and Evaluating XML Informat...
Sort
View
ESORICS
2002
Springer
14 years 6 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
IJSI
2008
115views more  IJSI 2008»
13 years 6 months ago
Towards Knowledge Acquisition from Semi-Structured Content
Abstract A rich family of generic Information Extraction (IE) techniques have been developed by researchers nowadays. This paper proposes WebKER, a system for automatically extract...
Xi Bai, Jigui Sun, Haiyan Che, Lian Shi
IDEAS
2009
IEEE
192views Database» more  IDEAS 2009»
14 years 1 months ago
A cluster-based approach to XML similarity joins
A natural consequence of the widespread adoption of XML as standard for information representation and exchange is the redundant storage of large amounts of persistent XML documen...
Leonardo Ribeiro, Theo Härder, Fernanda S. Pi...
EEE
2004
IEEE
13 years 10 months ago
Model-Driven Web Services Development
Web service technologies are becoming increasingly important for integrating systems and services. There is much activity and interest around standardization and usage of web serv...
Roy Grønmo, David Skogan, Ida Solheim, Jon ...
CAISE
2010
Springer
13 years 7 months ago
Situational Evaluation of Method Fragments: An Evidence-Based Goal-Oriented Approach
Despite advances in situational method engineering, many software organizations continue to adopt an ad-hoc mix of method fragments from wellknown development methods such as Scrum...
Hesam Chiniforooshan Esfahani, Eric Yu, Jordi Cabo...