Sciweavers

2905 search results - page 161 / 581
» Formal Memetic Algorithms
Sort
View
PROCEDIA
2010
127views more  PROCEDIA 2010»
13 years 5 months ago
Web service selection for transactional composition
In this work we address the issue of selecting and composing Web Services (WSs) considering functional requirements and transactional properties. We formalize the WS composition p...
Yudith Cardinale, Joyce El Haddad, Maude Manouvrie...
TKDE
2012
312views Formal Methods» more  TKDE 2012»
12 years 21 days ago
Efficient Fuzzy Type-Ahead Search in XML Data
—In a traditional keyword-search system over XML data, a user composes a keyword query, submits it to the system, and retrieves relevant answers. In the case where the user has l...
Jianhua Feng, Guoliang Li
TKDE
2012
208views Formal Methods» more  TKDE 2012»
12 years 21 days ago
A Knowledge-Driven Approach to Activity Recognition in Smart Homes
Abstract—This paper introduces a knowledge-driven approach to real-time, continuous activity recognition based on multisensor data streams in smart homes. The approach goes beyon...
Liming Chen, Chris D. Nugent, Hui Wang
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 3 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
ECRTS
2004
IEEE
14 years 2 months ago
Pessimistic Concurrency Control and Versioning to Support Database Pointers in Real-Time Databases
In this paper we present a concurrency control algorithm that allows co-existence of soft real-time, relational database transactions, and hard real-time database pointer transact...
Dag Nyström, Mikael Nolin, Aleksandra Tesanov...