Sciweavers

1656 search results - page 168 / 332
» Labeling Schemes with Queries
Sort
View
MASCOTS
2004
13 years 10 months ago
Reliable Response Delivery in Peer-to-Peer Systems
Unstructured peer-to-peer (P2P) system is the prevalent model in today's P2P system. In such systems, a response is sent along the same path that carried the incoming query m...
Xiaomei Liu, Yunhao Liu, Li Xiao
KDD
2007
ACM
227views Data Mining» more  KDD 2007»
14 years 9 months ago
Fast best-effort pattern matching in large attributed graphs
We focus on large graphs where nodes have attributes, such as a social network where the nodes are labelled with each person's job title. In such a setting, we want to find s...
Hanghang Tong, Christos Faloutsos, Brian Gallagher...
KBS
2007
74views more  KBS 2007»
13 years 9 months ago
Representation and processing of information related to real world events
Event based analysis plays an important role in reducing the latency of information delivery in an event driven world. Also, the perception of an ‘event’ by a user is at a hig...
Aparna Nagargadde, V. Sridhar, Krithi Ramamritham
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 7 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
ICWS
2007
IEEE
13 years 10 months ago
A Platform for Context Aware Runtime Web Service Discovery
In this paper we describe a platform that supports context aware runtime service discovery. The platform supports service discovery based on structural and behavioural service mod...
George Spanoudakis, Khaled Mahbub, Andrea Zisman