Sciweavers

1183 search results - page 217 / 237
» Model Transformation for Service-Oriented Web Applications D...
Sort
View
JWSR
2008
145views more  JWSR 2008»
13 years 7 months ago
An Access-Control Framework for WS-BPEL
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Federica Paci, Elisa Bertino, Jason Crampton
CIKM
2010
Springer
13 years 6 months ago
Detecting product review spammers using rating behaviors
This paper aims to detect users generating spam reviews or review spammers. We identify several characteristic behaviors of review spammers and model these behaviors so as to dete...
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Li...
ICDE
2010
IEEE
198views Database» more  ICDE 2010»
14 years 7 months ago
Q-Cop: Avoiding Bad Query Mixes to Minimize Client Timeouts Under Heavy Loads
In three-tiered web applications, some form of admission control is required to ensure that throughput and response times are not significantly harmed during periods of heavy load....
Sean Tozer, Tim Brecht, Ashraf Aboulnaga
EDBT
2010
ACM
200views Database» more  EDBT 2010»
14 years 2 months ago
Rewrite techniques for performance optimization of schema matching processes
A recurring manual task in data integration, ontology alignment or model management is finding mappings between complex meta data structures. In order to reduce the manual effor...
Eric Peukert, Henrike Berthold, Erhard Rahm
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 19 days ago
A Set Theory Based Approach on Applying Domain Semantics to XML Structures
As XML is gathering more and more importance in the field of data interchange in distributed business to business (B2B) applications, it is increasingly important to provide a for...
Wolfgang Schuetzelhofer, Karl M. Göschka