Sciweavers

3086 search results - page 591 / 618
» Developing Secure Web Applications
Sort
View
ASWC
2009
Springer
13 years 5 months ago
Repairing the Missing is-a Structure of Ontologies
Abstract. Developing ontologies is not an easy task and often the resulting ontologies are not consistent or complete. Such ontologies, although often useful, also lead to problems...
Patrick Lambrix, Qiang Liu 0002, He Tan
IEEESCC
2009
IEEE
13 years 5 months ago
QoS-Enabled Business-to-Business Integration Using ebBP to WS-BPEL Translations
Business-To-Business Integration (B2Bi) is a key mechanism for enterprises to gain competitive advantage. However, developing B2Bi applications is far from trivial. Inter alia, ag...
Andreas Schönberger, Thomas Benker, Stefan Fr...

Tutorial
2179views
15 years 8 months ago
Privacy in Location-Based Services: State-of-the-Art and Research Directions
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing locati...
Mohamed F. Mokbel
MOBISYS
2009
ACM
14 years 8 months ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...
SIGMOD
2007
ACM
188views Database» more  SIGMOD 2007»
14 years 7 months ago
Keyword search on relational data streams
Increasing monitoring of transactions, environmental parameters, homeland security, RFID chips and interactions of online users rapidly establishes new data sources and applicatio...
Alexander Markowetz, Yin Yang, Dimitris Papadias