Sciweavers

1533 search results - page 222 / 307
» Semantic Matching: Algorithms and Implementation
Sort
View
ACTA
2005
104views more  ACTA 2005»
13 years 10 months ago
Subtyping for session types in the pi calculus
Extending the pi calculus with the session types proposed by Honda et al. allows high-level specifications of structured patterns of communication, such as client-server protocols,...
Simon J. Gay, Malcolm Hole
IJIPT
2007
78views more  IJIPT 2007»
13 years 10 months ago
If objects could talk: a novel resource discovery approach for pervasive environments
: We propose to extend standard Radio Frequency IDentification (RFID) usage by storing semantically annotated data within RFID tags memory, so that objects may actually ‘describ...
Michele Ruta, Tommaso Di Noia, Eugenio Di Sciascio...
JCS
2010
124views more  JCS 2010»
13 years 8 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
BXML
2003
13 years 11 months ago
Rule-Based Generation of XML Schemas from UML Class Diagrams
We present an approach of how to automatically extract an XML document structure from a conceptual data model that describes the content of the document. We use UML class diagrams ...
Tobias Krumbein, Thomas Kudrass
LCTRTS
2001
Springer
14 years 2 months ago
Middleware For Building Adaptive Systems Via Configuration
1 COTS (commercial off-the-shelf) devices are capable of executing powerful, distributed algorithms. Very large, adaptive systems can be created by simply integrating these devices...
Sanjai Narain, Ravichander Vaidyanathan, Stanley M...