Sciweavers

257 search results - page 39 / 52
» The Generalized Deadlock Resolution Problem
Sort
View
CIKM
2005
Springer
14 years 1 months ago
The case for access control on XML relationships
With the emergence of XML as the de facto standard to exchange and disseminate information, the problem of regulating access to XML documents has attracted a considerable attentio...
Béatrice Finance, Saïda Medjdoub, Phil...
ICDM
2003
IEEE
158views Data Mining» more  ICDM 2003»
14 years 1 months ago
Combining Multiple Weak Clusterings
A data set can be clustered in many ways depending on the clustering algorithm employed, parameter settings used and other factors. Can multiple clusterings be combined so that th...
Alexander P. Topchy, Anil K. Jain, William F. Punc...
DEBS
2003
ACM
14 years 1 months ago
Client mobility in rendezvous-notify
Event-based computing is vital for the next generation mobile services and applications that need to meet user requirements irrespective of time and location. The event paradigm i...
Sasu Tarkoma, Jaakko Kangasharju, Kimmo E. E. Raat...
ICRE
1998
IEEE
14 years 3 days ago
Surfacing Root Requirements Interactions from Inquiry Cycle Requirements Documents
Systems requirements errors are numerous, persistent, and expensive. To detect such errors, and focus on critical ones during the development of a requirements document, we have d...
William N. Robinson, Suzanne D. Pawlowski
LREC
2008
88views Education» more  LREC 2008»
13 years 9 months ago
An Infrastructure, Tools and Methodology for Evaluation of Multicultural Name Matching Systems
This paper describes a Name Matching Evaluation Laboratory that is a joint effort across multiple projects. The lab houses our evaluation infrastructure as well as multiple name m...
Keith J. Miller, Mark Arehart, Catherine Ball, Joh...