Sciweavers

857 search results - page 40 / 172
» Will this paper ever be cited
Sort
View
CCS
2006
ACM
14 years 14 days ago
An efficient key establishment scheme for secure aggregating sensor networks
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks. A new node joining the network needs to efficiently and autonomously set up s...
Erik-Oliver Blaß, Martina Zitterbart
ECOWS
2006
Springer
14 years 12 days ago
Maintaining Consistency between Loosely Coupled Services in the Presence of Timing Constraints and Validation Errors
Loose coupling is often cited as a defining characteristic of service-oriented architectures. Interactions between services take place via messages in an asynchronous environment ...
Carlos Molina-Jiménez, Santosh K. Shrivasta...
ICSE
2000
IEEE-ACM
14 years 10 days ago
A software engineering approach and tool set for developing Internet applications
If a business built a plant to produce products without first designing a process to manufacture them, the risk would be lack of capacity without significant plant redesign. Simil...
David A. Marca, Beth A. Perdue
VLDB
1995
ACM
181views Database» more  VLDB 1995»
14 years 8 days ago
NeuroRule: A Connectionist Approach to Data Mining
Classification, which involves finding rules that partition a given da.ta set into disjoint groups, is one class of data mining problems. Approaches proposed so far for mining cla...
Hongjun Lu, Rudy Setiono, Huan Liu
AAAI
2007
13 years 11 months ago
Joint Inference in Information Extraction
The goal of information extraction is to extract database records from text or semi-structured sources. Traditionally, information extraction proceeds by first segmenting each ca...
Hoifung Poon, Pedro Domingos