Sciweavers

451 search results - page 57 / 91
» Constrained Sums of Information Systems
Sort
View
DCOSS
2011
Springer
12 years 8 months ago
Transmission Control Policy design for decentralized detection in sensor networks
—A Wireless Sensor Network (WSN) deployed for detection applications has the distinguishing feature that sensors cooperate to perform the detection task. Therefore, the decoupled...
Ashraf Tantawy, Xenofon D. Koutsoukos, Gautam Bisw...
CAISE
2004
Springer
14 years 1 months ago
Description Logics for Interoperability
tween documents. They should allow for an abstract representation of data which resembles the way they are actually perceived and used in the real world, thus shortening (with resp...
Enrico Franconi
PODS
2010
ACM
228views Database» more  PODS 2010»
13 years 10 months ago
Capturing missing tuples and missing values
Databases in real life are often neither entirely closed-world nor entirely open-world. Indeed, databases in an enterprise are typically partially closed, in which a part of the d...
Wenfei Fan, Floris Geerts
WPES
2006
ACM
14 years 2 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
HICSS
2008
IEEE
175views Biometrics» more  HICSS 2008»
14 years 2 months ago
Service-Oriented Resource Management
Service Management controls how business services are developed and delivered to customers. Business services must be flexible negotiable between customer and provider. Temporal a...
Jürgen Dorn, Hannes Werthner