Sciweavers

5130 search results - page 1001 / 1026
» Constraint Query Languages
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 4 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
CLEF
2007
Springer
14 years 4 months ago
Simple Morpheme Labelling in Unsupervised Morpheme Analysis
This paper presents my participation to the second Morpho Challenge. Results have been obtained with the algorithm already presented at Morpho Challenge 2005. The system takes a p...
Delphine Bernhard
MDM
2007
Springer
125views Communications» more  MDM 2007»
14 years 3 months ago
Extending P3P/Appel for Friend Finder
FriendFinder as a location-based service collects location data from mobile users and distributes a particular user’s location upon request. Privacy of users data especially loc...
Emin Islam Tatli
OTM
2007
Springer
14 years 3 months ago
Parallelizing Tableaux-Based Description Logic Reasoning
Practical scalability of Description Logic (DL) reasoning is an important premise for the adoption of OWL in a real-world setting. Many highly efficient optimizations for the DL ta...
Thorsten Liebig, Felix Müller
SKG
2006
IEEE
14 years 3 months ago
Mathematics Computing Environment on the Web
With the rapid evolution of web technology and Internet, the mathematical web has emerged as a new research trend, which changes the traditional manner of mathematical scientific ...
Li Liu, Yi Yang, Lian Li
« Prev « First page 1001 / 1026 Last » Next »