Sciweavers

2503 search results - page 463 / 501
» Building Computer Network Attacks
Sort
View
POLICY
2007
Springer
14 years 1 months ago
Specifying and Enforcing High-Level Semantic Obligation Policies
Obligation Policies specify management actions that must be performed when a particular kind of event occurs and certain conditions are satisfied. Large scale distributed systems...
Zhen Liu, Anand Ranganathan, Anton Riabov
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
14 years 1 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
IWNAS
2006
IEEE
14 years 1 months ago
Towards a More Accurate Availability Evaluation
Data availability evaluation is the crucial problem to build large-scale, high available peer-to-peer storage systems by governing many unreliable hosts. However, many recent stud...
Zhi Yang, Jing Tian, Yafei Dai
MOBIDE
2006
ACM
14 years 1 months ago
Boosting location-based services with a moving object database engine
Composition of temporal and spatial properties of real world objects in a unified data framework results into Moving Object Databases (MOD). MODs are able to process, manage and a...
Nikos Pelekis, Yannis Theodoridis
WIKIS
2006
ACM
14 years 1 months ago
OntoWiki: community-driven ontology engineering and ontology usage based on Wikis
Ontologies are consensual representations of a domain of discourse and the backbone of the future Semantic Web. Currently, however, only a fraction of Web users can take part in t...
Martin Hepp, Daniel Bachlechner, Katharina Siorpae...