Sciweavers

1479 search results - page 27 / 296
» Management without (Detailed) Models
Sort
View
WWW
2007
ACM
14 years 9 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 6 months ago
Ontology-based Queries over Cancer Data
The ever-increasing amount of data in biomedical research, and in cancer research in particular, needs to be managed to support efficient data access, exchange and integration. Exi...
Alejandra González Beltrán, Ben Tagg...
EXPDB
2006
ACM
14 years 2 months ago
A Reproducible Benchmark for P2P Retrieval
With the growing popularity of information retrieval (IR) in distributed systems and in particular P2P Web search, a huge number of protocols and prototypes have been introduced i...
Thomas Neumann, Matthias Bender, Sebastian Michel,...
CIKM
2008
Springer
13 years 10 months ago
Probabilistic polyadic factorization and its application to personalized recommendation
Multiple-dimensional, i.e., polyadic, data exist in many applications, such as personalized recommendation and multipledimensional data summarization. Analyzing all the dimensions...
Yun Chi, Shenghuo Zhu, Yihong Gong, Yi Zhang
ER
2008
Springer
111views Database» more  ER 2008»
13 years 10 months ago
The Situation Lens: Looking into Personal Service Composition
Abstract. In this paper we discuss about composing services from standard suites of applications for personal data management in mobile devices. We propose a data model and an inte...
Augusto Celentano, Stefano Faralli, Fabio Pittarel...