Sciweavers

3096 search results - page 62 / 620
» Ontology: Use and Abuse
Sort
View
ICSOC
2009
Springer
13 years 8 months ago
Towards Ontology Matching for Intelligent Gadgets
The FAST gadget development environment allows users to graphically compose intelligent, i.e., semantically annotated gadgets from predefined building blocks and deploy them on var...
Oszkar Ambrus, Knud Möller, Siegfried Handsch...
VLDB
1997
ACM
84views Database» more  VLDB 1997»
14 years 2 months ago
Using Versions in Update Transactions: Application to Integrity Checking
This paper proposes an extension of the multiversion two phase locking protocol, called EMVZPL, which enables update transactions to use versions while guaranteeing the serializab...
François Llirbat, Eric Simon, Dimitri Tombr...
ECOOP
2010
Springer
14 years 1 months ago
The Use of Overloading in Java Programs
Method overloading is a controversial language feature, especially in the context of Object Oriented languages, where its interaction with overriding may lead to confusing semantic...
Joseph Gil, Keren Lenz
IJNSEC
2006
89views more  IJNSEC 2006»
13 years 10 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara
HIP
2005
Springer
173views Cryptology» more  HIP 2005»
14 years 3 months ago
Characters or Faces: A User Study on Ease of Use for HIPs
Web-based services designed for human users are being abused by computer programs (bots). This real-world issue has recently generated a new research area called Human Interactive...
Yong Rui, Zicheng Liu, Shannon Kallin, Gavin Janke...