Sciweavers

3921 search results - page 763 / 785
» Transforming Models with ATL
Sort
View
ADBIS
2004
Springer
224views Database» more  ADBIS 2004»
14 years 1 months ago
Using Ontologies for Database Query Reformulation
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...
Chokri Ben Necib, Johann Christoph Freytag
VLDB
2004
ACM
100views Database» more  VLDB 2004»
14 years 1 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
CITA
2003
IEEE
14 years 28 days ago
Internet Diffusion and E-Business Opportunities Amongst Malaysian Travel Agencies
This paper reports an investigation into the adoption of the Internet amongst Malaysian travel agencies as a means of exploring the likely future potential growth of e-business wi...
Raja Mazhatul Yasmin Suraya
IV
2003
IEEE
200views Visualization» more  IV 2003»
14 years 28 days ago
Artist As Researcher, Understanding The Tools
The paper begins with a response to the nature of contemporary artists relationships to how computers have permeated the fine art domain and how they affect the creative process. ...
Theresa Gartland-Jones
NDSS
2003
IEEE
14 years 28 days ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...