Sciweavers

237 search results - page 37 / 48
» Economics of Personal Information Exchange
Sort
View
ICPW
2007
13 years 9 months ago
Mind the gap!: Transcending the tunnel view on ontology engineering
The key objective of communal knowledge sharing at the scale of the World Wide Web is the ability to collaborate and integrate within and between communities. Ontologies, being fo...
Pieter De Leenheer, Stijn Christiaens
CONEXT
2009
ACM
13 years 8 months ago
Improving internet-wide routing protocols convergence with MRPC timers
The behavior of routing protocols during convergence is critical as it impacts end-to-end performance. Network convergence is particularly important in BGP, the current interdomai...
Anthony J. Lambert, Marc-Olivier Buob, Steve Uhlig
ICDT
2012
ACM
251views Database» more  ICDT 2012»
11 years 10 months ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
JUCS
2008
194views more  JUCS 2008»
13 years 7 months ago
An Application of Meta Search Agent System Based on Semantized Tags for Enhanced Web Searching
: Web searching techniques have been investigated and implemented in many aspects. Particularly, in case of personalization, more important issue is how to manipulate the results r...
Chonggun Kim, JaeYoun Jung, Hyeon-Cheol Zin, Jason...
CCS
2009
ACM
14 years 2 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...