Sciweavers

517 search results - page 96 / 104
» Web service security management using semantic web technique...
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
ICDE
2006
IEEE
159views Database» more  ICDE 2006»
14 years 2 months ago
Replication Based on Objects Load under a Content Distribution Network
Users tend to use the Internet for “resource-hungry” applications (which involve content such as video, audio on-demand and distributed data) and at the same time, more and mo...
George Pallis, Konstantinos Stamos, Athena Vakali,...
ADC
2005
Springer
135views Database» more  ADC 2005»
14 years 2 months ago
A Path-based Relational RDF Database
We propose a path-based scheme for storage and retrieval of RDF data using a relational database. The Semantic Web is much anticipated as the nextgeneration web where high-level p...
Akiyoshi Matono, Toshiyuki Amagasa, Masatoshi Yosh...
BMCBI
2010
116views more  BMCBI 2010»
13 years 8 months ago
SEQADAPT: an adaptable system for the tracking, storage and analysis of high throughput sequencing experiments
Background: High throughput sequencing has become an increasingly important tool for biological research. However, the existing software systems for managing and processing these ...
David B. Burdick, Christopher C. Cavnor, Jeremy Ha...
AVI
2008
13 years 9 months ago
Query-through-drilldown: data-oriented extensional queries
Traditional database query formulation is intensional: at the level of schemas, table and column names. Previous work has shown that filters can be created using a query paradigm ...
Alan J. Dix, Damon Oram