Sciweavers

2310 search results - page 342 / 462
» Managing System and Active-Content Integrity
Sort
View
ADBIS
2008
Springer
142views Database» more  ADBIS 2008»
14 years 2 months ago
Evaluating Performance and Quality of XML-Based Similarity Joins
A similarity join correlating fragments in XML documents, which are similar in structure and content, can be used as the core algorithm to support data cleaning and data integratio...
Leonardo Ribeiro, Theo Härder
ACSAC
2007
IEEE
14 years 2 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...
HICSS
2007
IEEE
143views Biometrics» more  HICSS 2007»
14 years 2 months ago
B-to-B E-Commerce: Assessing the Impacts of RFID Technology in a Five Layer Supply Chain
This paper attempts to track key performance indicators in order to assess the impacts of RFID technology in a five layer supply chain in the utility sector. Findings point to som...
Ygal Bendavid, Élisabeth Lefebvre, Louis A....
AI
2007
Springer
14 years 2 months ago
Fuzzy Clustering for Topic Analysis and Summarization of Document Collections
Abstract. Large document collections, such as those delivered by Internet search engines, are difficult and time-consuming for users to read and analyse. The detection of common an...
René Witte, Sabine Bergler
CONTEXT
2007
Springer
14 years 2 months ago
Context-sensitive Referencing for Ontology Mapping Disambiguation
Abstract. Ontologies can be used for e-business integration, for example by describing existing e-business standards as ontologies. If cooperating parties use different ontologies...
Heiko Paulheim, Michael Rebstock, Janina Fengel