Sciweavers

3104 search results - page 73 / 621
» Competence-Based EE-Learning: (How) Can We Implement It
Sort
View
FTDCS
2004
IEEE
15 years 8 months ago
GT-P2PRMI: Improving Middleware Performance Using Peer-to-Peer Service Replication
Peer-to-peer systems have the desirable property that the amount of resources available in the system increase as demand for services increases due to growth of the system. We exp...
Tianying Chang, Mustaque Ahamad
DLOG
2011
14 years 8 months ago
Query Answering over SROIQ Knowledge Bases with SPARQL
W3C currently extends the SPARQL query language with so-called entailment regimes, which define how queries are evaluated using logical entailment relations. We describe a sound a...
Ilianna Kollia, Birte Glimm, Ian Horrocks
JCS
2011
72views more  JCS 2011»
14 years 11 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
VL
2009
IEEE
157views Visual Languages» more  VL 2009»
15 years 11 months ago
Combining spatial and semantic label analysis
Labels in spreadsheets can be exploited for finding errors in spreadsheet formulas. Previous approaches have either used the positional information of labels or their interpretat...
Chris Chambers, Martin Erwig
FIMI
2003
136views Data Mining» more  FIMI 2003»
15 years 6 months ago
Intersecting data to closed sets with constraints
We describe a method for computing closed sets with data-dependent constraints. Especially, we show how the method can be adapted to find frequent closed sets in a given data set...
Taneli Mielikäinen