Sciweavers

2777 search results - page 487 / 556
» The Challenges of Service Evolution
Sort
View
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 7 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
VTC
2010
IEEE
168views Communications» more  VTC 2010»
13 years 7 months ago
Cross-Layer Adaptive H.264/AVC Streaming over IEEE 802.11e Experimental Testbed
—In recent years, the rapid development of wireless communication allows us to enjoy more multimedia services via wireless network. However, due to lack of QoS support and charac...
Cheng-Han Mai, Yin-Cheng Huang, Hung-Yu Wei
WS
2010
ACM
13 years 7 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
ECWEB
2010
Springer
195views ECommerce» more  ECWEB 2010»
13 years 7 months ago
Bilateral Negotiation in a Multi-agent Supply Chain System
A supply chain is a set of organizations directly linked by flows of services from suppliers to customers. Supply chain activities range from the ordering and receipt of raw materi...
Fernando Lopes, Helder Coelho
GLOBECOM
2010
IEEE
13 years 7 months ago
Multicasting in Delay Tolerant Networks: Delegation Forwarding
Delay tolerant networks (DTNs) are a kind of wireless mobile network which may lack continuous network connectivity. Multicast supports the distribution of data to a group of users...
Yunsheng Wang, Xiaoguang Li, Jie Wu