Sciweavers

ASIAN
2005
Springer
96views Algorithms» more  ASIAN 2005»
14 years 2 months ago
An Extended Mandatory Access Control Model for XML
Dong-Zhan Zhang, Yong-Sheng Xue
ASIAN
2005
Springer
130views Algorithms» more  ASIAN 2005»
14 years 2 months ago
A Hybrid Method for Detecting Data Stream Changes with Complex Semantics in Intensive Care Unit
Abstract. Detecting changes in data streams is very important for many applications. This paper presents a hybrid method for detecting data stream changes in intensive care unit. I...
Ting Yin, Hongyan Li, Zijing Hu, Yu Fan, Jianlong ...
ASIAN
2005
Springer
102views Algorithms» more  ASIAN 2005»
14 years 2 months ago
General Consistency Management Within the Development of Ontology-Driven Web Information System
This paper proposes a general consistency management methodology within ontology-driven WIS development. The contributions of this paper are follows: 1) introduces the concept stru...
Baojun Qiu, Hongyan Li, Zijing Hu, Dongqing Yang, ...
ASIAN
2005
Springer
92views Algorithms» more  ASIAN 2005»
14 years 2 months ago
Mining Correlations Between Multi-streams Based on Haar Wavelet
An-long Chen, Changjie Tang, Chang-an Yuan, Jing P...
ASIAN
2005
Springer
121views Algorithms» more  ASIAN 2005»
14 years 6 months ago
Practical Indexing XML Document for Twig Query
Hongzhi Wang, Wei Wang 0011, Jianzhong Li, Xuemin ...
ASIAN
2005
Springer
178views Algorithms» more  ASIAN 2005»
14 years 6 months ago
An Approach for Service Discovery Based on Semantic Peer-to-Peer
The service discovery is a key step during Peer-to-Peer (P2P) converging with Web Service. In this paper, a semantic-P2P based approach is presented for web service discovery. To e...
Hao Wu, Hai Jin, Yunfa Li, Hanhan Chen
ASIAN
2005
Springer
87views Algorithms» more  ASIAN 2005»
14 years 6 months ago
Database and Information Retrieval Techniques for XML
Mariano P. Consens, Ricardo A. Baeza-Yates
ASIAN
2005
Springer
150views Algorithms» more  ASIAN 2005»
14 years 6 months ago
ACB-R: An Adaptive Clustering-Based Data Replication Algorithm on a P2P Data-Store
Replication on geographically distributed, unreliable, P2P interconnecting nodes can offer high data availability and low network latency for replica access. The challenge is how ...
Junhu Zhang, Dongqing Yang, Shiwei Tang
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
14 years 6 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu
ASIAN
2005
Springer
96views Algorithms» more  ASIAN 2005»
14 years 6 months ago
Query Incentive Networks
The concurrent growth of on-line communities exhibiting large-scale social structure, and of large decentralized peer-to-peer file-sharing systems, has stimulated new interest in...
Prabhakar Raghavan