Sciweavers

398 search results - page 53 / 80
» Critical exponents of graphs
Sort
View
CIDM
2009
IEEE
14 years 4 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
ESWS
2009
Springer
14 years 4 months ago
Representing, Querying and Transforming Social Networks with RDF/SPARQL
As social networks are becoming ubiquitous on the Web, the Semantic Web goals indicate that it is critical to have a standard model allowing exchange, interoperability, transformat...
Mauro San Martín, Claudio Gutierrez
INFOCOM
2007
IEEE
14 years 4 months ago
Towards Topology Aware Networks
— We focus on efficient protocols that enhance a network with topology awareness. We discuss centralized algorithms with provable performance, and introduce decentralized asynch...
Christos Gkantsidis, Gagan Goel, Milena Mihail, Am...
BPM
2005
Springer
101views Business» more  BPM 2005»
14 years 3 months ago
Service Retrieval Based on Behavioral Specifications and Quality Requirements
: The capability to easily find useful services becomes increasingly critical in several fields. In this paper we argue that, in many situations, the service discovery process shou...
Daniela Grigori, Verónika Peralta, Mokrane ...
ISPD
2004
ACM
92views Hardware» more  ISPD 2004»
14 years 3 months ago
A predictive distributed congestion metric and its application to technology mapping
Due to increasing design complexity, routing congestion has become a critical problem in VLSI designs. This paper introduces a distributed metric to predict routing congestion for...
Rupesh S. Shelar, Sachin S. Sapatnekar, Prashant S...