Sciweavers

273 search results - page 50 / 55
» Invisible Deployment of Integration Processes
Sort
View
WWW
2010
ACM
14 years 3 months ago
A pattern tree-based approach to learning URL normalization rules
Duplicate URLs have brought serious troubles to the whole pipeline of a search engine, from crawling, indexing, to result serving. URL normalization is to transform duplicate URLs...
Tao Lei, Rui Cai, Jiang-Ming Yang, Yan Ke, Xiaodon...
IEEESCC
2007
IEEE
14 years 2 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
IJCSA
2008
237views more  IJCSA 2008»
13 years 8 months ago
Development of A SOLAP Patrimony Management Application System: Fez Medina as a Case Study
It is well known that transactional and analytical systems each require different database architecture. In general, the database structure of transactional systems is optimized f...
I. Salam, M. El Mohajir, A. Taleb, B. El Mohajir
SAC
2008
ACM
13 years 7 months ago
Model-driven development of component-based adaptive distributed applications
This paper introduces an approach to develop componentbased adaptive distributed applications. Our approach separates the communication and the functional aspects of a distributed...
An Phung-Khac, Antoine Beugnard, Jean-Marie Gillio...
SENSYS
2006
ACM
14 years 2 months ago
Capturing high-frequency phenomena using a bandwidth-limited sensor network
Small-form-factor, low-power wireless sensors—motes—are convenient to deploy, but lack the bandwidth to capture and transmit raw high-frequency data, such as human voices or n...
Ben Greenstein, Christopher Mar, Alex Pesterev, Sh...