Sciweavers

1656 search results - page 267 / 332
» Labeling Schemes with Queries
Sort
View
DASFAA
2007
IEEE
191views Database» more  DASFAA 2007»
13 years 11 months ago
ABIDE: A Bid-Based Economic Incentive Model for Enticing Non-cooperative Peers in Mobile-P2P Networks
In mobile ad-hoc peer-to-peer (M-P2P) networks, a large percentage of the mobile peers typically do not provide any service to the network, thereby motivating incentive schemes for...
Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsur...
ICICS
2007
Springer
13 years 11 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
AAAI
2008
13 years 10 months ago
A Meta-Programming Technique for Debugging Answer-Set Programs
Answer-set programming (ASP) is widely recognised as a viable tool for declarative problem solving. However, there is currently a lack of tools for developing answer-set programs....
Martin Gebser, Jörg Pührer, Torsten Scha...
EDBT
2008
ACM
146views Database» more  EDBT 2008»
13 years 9 months ago
SPARQLing constraints for RDF
The goal of the Semantic Web is to support semantic interoperability between applications exchanging data on the web. The idea heavily relies on data being made available in machi...
Georg Lausen, Michael Meier 0002, Michael Schmidt
TREC
2008
13 years 9 months ago
KLE at TREC 2008 Blog Track: Blog Post and Feed Retrieval
This paper describes our participation in the TREC 2008 Blog Track. For the opinion task, we made an opinion retrieval model that consists of preprocessing, topic retrieval, opini...
Yeha Lee, Seung-Hoon Na, Jungi Kim, Sang-Hyob Nam,...