Sciweavers

283 search results - page 31 / 57
» Putting the Pieces Together
Sort
View
ICWS
2008
IEEE
13 years 10 months ago
A Temporal Data-Mining Approach for Discovering End-to-End Transaction Flows
Effective management of Web Services systems relies on accurate understanding of end-to-end transaction flows, which may change over time as the service composition evolves. This ...
Ting Wang, Chang-Shing Perng, Tao Tao, Chunqiang T...
RIAO
2007
13 years 10 months ago
XML Fragments Extended with Database Operators
XML documents represent a middle range between unstructured data such as textual documents and fully structured data encoded in databases. Typically, information retrieval techniq...
Yosi Mass, Dafna Sheinwald, Benjamin Sznajder, Siv...
IASTEDSE
2004
13 years 10 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
DEBU
2010
135views more  DEBU 2010»
13 years 8 months ago
Enhancing Search with Structure
Keyword search has traditionally focussed on retrieving documents in ranked order, given simple keyword queries. Similarly, work on keyword queries on structured data has focussed...
Soumen Chakrabarti, Sunita Sarawagi, S. Sudarshan
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 8 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz