Sciweavers

773 search results - page 135 / 155
» An iTask Case Study: A Conference Management System
Sort
View
WWW
2005
ACM
14 years 9 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
PODS
2009
ACM
229views Database» more  PODS 2009»
14 years 9 months ago
Computing all skyline probabilities for uncertain data
Skyline computation is widely used in multi-criteria decision making. As research in uncertain databases draws increasing attention, skyline queries with uncertain data have also ...
Mikhail J. Atallah, Yinian Qi
HICSS
2010
IEEE
161views Biometrics» more  HICSS 2010»
14 years 3 months ago
Climate Conscious Relations in a Digital Urban Setting
The climate change has challenged urban living: As an omnipresent force nature sets the agenda for urban life. Using stakeholder theory for conceptualizing urban life, we install ...
Anne Ellerup Nielsen, Sophie Esmann Andersen
AOSD
2009
ACM
14 years 3 months ago
Can we refactor conditional compilation into aspects?
Systems software uses conditional compilation to manage crosscutting concerns in a very fine-grained and efficient way, but at the expense of tangled and scattered conditional c...
Bram Adams, Wolfgang De Meuter, Herman Tromp, Ahme...
AOSD
2009
ACM
14 years 3 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter