Sciweavers

169 search results - page 31 / 34
» Schema Based XML Security: RBAC Approach
Sort
View
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
14 years 1 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...
IDA
2007
Springer
13 years 7 months ago
Inference of node replacement graph grammars
Graph grammars combine the relational aspect of graphs with the iterative and recursive aspects of string grammars, and thus represent an important next step in our ability to dis...
Jacek P. Kukluk, Lawrence B. Holder, Diane J. Cook
GIS
2002
ACM
13 years 7 months ago
Handling semantic heterogeneities using declarative agreements
The focus of this paper is on interoperability issues to achieve data integration in distributed databases for geographic applications. Our concrete application is in the context ...
Isabel F. Cruz, Afsheen Rajendran, William Sunna, ...
ECWEB
2004
Springer
148views ECommerce» more  ECWEB 2004»
14 years 29 days ago
OCL-Constraints for UMM Business Collaborations
Abstract. Recently, a trend towards business processes in Business-toBusiness e-Commerce (B2B) is apparent. One of the most promising approaches is UN/CEFACT’s modeling methodolo...
Birgit Hofreiter, Christian Huemer, Werner Winiwar...
CIIA
2009
13 years 8 months ago
Web Services Composition Applying MDA
Currently, Web services are available on Internet in a simple and easy way to use. However, a single service can not respond to a predetermined request by user. Thus, it is necessa...
Yamina Hachemi, Mimoun Malki, Djamel Amar Bensaber