Sciweavers

1227 search results - page 185 / 246
» The Challenges of Application Service Hosting
Sort
View
WS
2010
ACM
13 years 8 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
VLDB
2004
ACM
108views Database» more  VLDB 2004»
14 years 10 months ago
Retrospective on Aurora
This experience paper summarizes the key lessons we learned throughout the design and implementation of the Aurora stream processing engine. For the past two years, we have built f...
Hari Balakrishnan, Magdalena Balazinska, Donald Ca...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 4 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
COMSWARE
2006
IEEE
14 years 4 months ago
Middleware for wireless sensor networks: A survey
Given the fast growing technological progress in microelectronics and wireless communication devices, in the near future, it is foreseeable that Wireless Sensor Networks (WSN) wil...
Salem Hadim, Nader Mohamed
CCGRID
2005
IEEE
14 years 3 months ago
A high performance configurable transport protocol for grid computing
− Grid computing infrastructures and applications are increasingly diverse, with networks ranging from very high bandwidth optical networks to wireless networks and applications ...
Xinran (Ryan) Wu, Andrew A. Chien, Matti A. Hiltun...