Sciweavers

1711 search results - page 90 / 343
» Completing pseudojump operators
Sort
View
EDOC
2007
IEEE
14 years 2 months ago
Business and IT Alignment with SEAM for Enterprise Architecture
To align an IT system with an organization’s needs, it is necessary to understand the organization’s position within its environment as well as its internal configuration. In ...
Alain Wegmann, Gil Regev, Irina Rychkova, Lam-Son ...
LICS
2007
IEEE
14 years 2 months ago
On Noetherian Spaces
A topological space is Noetherian iff every open is compact. Our starting point is that this notion generalizes that of well-quasi order, in the sense that an Alexandroff-discrete...
Jean Goubault-Larrecq
QSIC
2007
IEEE
14 years 2 months ago
A Pattern-Based Constraint Description Approach for Web Services
Current WSDL-based description specifies only the operation signatures and locations of Web services. It is widely recognized that a richer description is needed. WS-Security, WS-...
Qianxiang Wang, Min Li, Na Meng, Yonggang Liu, Hon...
VTC
2007
IEEE
14 years 2 months ago
On Preamble Length of OFDM-WLAN
— A preamble technique for synchronization and channel estimation introduces transmission delay and wastes capacity unavoidably due to the time loss before data transmission. In ...
Ting-Jung Liang, Wolfgang Rave, Gerhard Fettweis
ICDT
2007
ACM
90views Database» more  ICDT 2007»
14 years 2 months ago
On the Expressiveness of Implicit Provenance in Query and Update Languages
Abstract. Information concerning the origin of data (that is, its provenance) is important in many areas, especially scientific recordkeeping. Currently, provenance information mu...
Peter Buneman, James Cheney, Stijn Vansummeren