Sciweavers

2606 search results - page 418 / 522
» cost 2008
Sort
View
EMS
2008
IEEE
15 years 6 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
ESA
2008
Springer
134views Algorithms» more  ESA 2008»
15 years 6 months ago
Improved Randomized Results for That Interval Selection Problem
Online interval selection is a problem in which intervals arrive one by one, sorted by their left endpoints. Each interval has a length and a non-negative weight associated with i...
Leah Epstein, Asaf Levin
ESA
2008
Springer
115views Algorithms» more  ESA 2008»
15 years 6 months ago
Deterministic Sampling Algorithms for Network Design
For several NP-hard network design problems, the best known approximation algorithms are remarkably simple randomized algorithms called Sample-Augment algorithms in [11]. The algor...
Anke van Zuylen
ESWS
2008
Springer
15 years 6 months ago
Integrating Open Sources and Relational Data with SPARQL
We believe that the possibility to use SPARQL as a front end to heterogeneous data without significant cost in performance or expressive power is key to RDF taking its rightful pla...
Orri Erling, Ivan Mikhailov
ESWS
2008
Springer
15 years 6 months ago
Building a Semantic Web Image Repository for Biological Research Images
Abstract. Images play a vital role in scientific studies. An image repository would become a costly and meaningless data graveyard without descriptive metadata. We adapted EPrints,...
Jun Zhao, Graham Klyne, David M. Shotton