Sciweavers

5324 search results - page 811 / 1065
» Internet Security Protocols
Sort
View
SEMWEB
2009
Springer
14 years 5 months ago
Executing SPARQL Queries over the Web of Linked Data
The Web of Linked Data forms a single, globally distributed dataspace. Due to the openness of this dataspace, it is not possible to know in advance all data sources that might be r...
Olaf Hartig, Christian Bizer, Johann Christoph Fre...
HT
2009
ACM
14 years 5 months ago
Sixearch.org 2.0 peer application for collaborative web search
Sixearch.org is a peer application for social, distributed, adaptive Web search, which integrates the Sixearch.org protocol, a topical crawler, a document indexing system, a retri...
Namrata Lele, Le-Shin Wu, Ruj Akavipat, Filippo Me...
IMC
2009
ACM
14 years 5 months ago
Energy consumption in mobile phones: a measurement study and implications for network applications
In this paper, we present a measurement study of the energy consumption characteristics of three widespread mobile networking technologies: 3G, GSM, and WiFi. We find that 3G and...
Niranjan Balasubramanian, Aruna Balasubramanian, A...
SOSE
2008
IEEE
14 years 5 months ago
Precise Steps for Choreography Modeling for SOA Validation and Verification
Service-oriented architecture (SOA) enables organizations to transform their existing IT infrastructure into a more flexible business process platform.. In this architecture, deco...
Sebastian Wieczorek, Andreas Roth, Alin Stefanescu...
WISE
2008
Springer
14 years 5 months ago
Approximate Information Filtering in Peer-to-Peer Networks
Abstract. Most approaches to information filtering taken so far have the underlying hypothesis of potentially delivering notifications from every information producer to subscrib...
Christian Zimmer, Christos Tryfonopoulos, Klaus Be...