Sciweavers

2606 search results - page 418 / 522
» cost 2008
Sort
View
EMS
2008
IEEE
13 years 10 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
ESA
2008
Springer
134views Algorithms» more  ESA 2008»
13 years 10 months ago
Improved Randomized Results for That Interval Selection Problem
Online interval selection is a problem in which intervals arrive one by one, sorted by their left endpoints. Each interval has a length and a non-negative weight associated with i...
Leah Epstein, Asaf Levin
ESA
2008
Springer
115views Algorithms» more  ESA 2008»
13 years 10 months ago
Deterministic Sampling Algorithms for Network Design
For several NP-hard network design problems, the best known approximation algorithms are remarkably simple randomized algorithms called Sample-Augment algorithms in [11]. The algor...
Anke van Zuylen
ESWS
2008
Springer
13 years 10 months ago
Integrating Open Sources and Relational Data with SPARQL
We believe that the possibility to use SPARQL as a front end to heterogeneous data without significant cost in performance or expressive power is key to RDF taking its rightful pla...
Orri Erling, Ivan Mikhailov
ESWS
2008
Springer
13 years 10 months ago
Building a Semantic Web Image Repository for Biological Research Images
Abstract. Images play a vital role in scientific studies. An image repository would become a costly and meaningless data graveyard without descriptive metadata. We adapted EPrints,...
Jun Zhao, Graham Klyne, David M. Shotton