Sciweavers

1719 search results - page 329 / 344
» Magic Sets for Data Integration
Sort
View
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 2 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
ICSOC
2009
Springer
14 years 1 months ago
Evaluating Contract Compatibility for Service Composition in the SeCO2 Framework
Recently, the Software-as-a-Service (SaaS) model has been increasingly supported, becoming a major part of the new emerging cloud computing paradigms. Although SaaS exists in diff...
Marco Comerio, Hong Linh Truong, Flavio De Paoli, ...
SEMWEB
2009
Springer
14 years 1 months ago
Using AgreementMaker to align Ontologies for OAEI 2009: Overview, Results, and Outlook
Abstract. This paper describes our participation in the Ontology Alignment Evaluation Initiative (OAEI) 2009 with the AgreementMaker system for ontology matching, in which we obtai...
Isabel F. Cruz, Flavio Palandri Antonelli, Cosmin ...
BROADNETS
2007
IEEE
14 years 1 months ago
Reduced flow routing: Leveraging residual capacity to reduce blocking in GMPLS networks
— Traffic engineering has been extensively studied to maximize network resource utilization while minimizing call blocking [1]. As the the demand for high data rate services ove...
Xiaolan J. Zhang, Sun-il Kim, Steven S. Lumetta
CODES
2007
IEEE
14 years 1 months ago
Channel trees: reducing latency by sharing time slots in time-multiplexed networks on chip
Networks on Chip (NoC) have emerged as the design paradigm for scalable System on Chip communication infrastructure. A growing number of applications, often with firm (FRT) or so...
Andreas Hansson, Martijn Coenen, Kees Goossens