A Web Service Similarity Refinement Framework Using Automata Comparison (Englisch)
- Neue Suche nach: Chen, Lu
- Neue Suche nach: Chow, Randy
- Neue Suche nach: Chen, Lu
- Neue Suche nach: Chow, Randy
In:
Information Systems, Technology and Management
2
;
44-55
;
2010
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:A Web Service Similarity Refinement Framework Using Automata Comparison
-
Beteiligte:Chen, Lu ( Autor:in ) / Chow, Randy ( Autor:in )
-
Erschienen in:Information Systems, Technology and Management , 2 ; 44-55Communications in Computer and Information Science ; 54, 2 ; 44-55
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Service Discovery Protocols for VANET Based Emergency Preparedness Class of Applications: A Necessity Public Safety and SecurityPazzi, Richard Werner / Abrougui, Kaouther / Rezende, Cristiano / Boukerche, Azzedine et al. | 2010
- 8
-
High-End Analytics and Data Mining for Sustainable Competitive AdvantageChoudhary, Alok N. / Narayanan, Ramanathan / Zhang, Kunpeng et al. | 2010
- 16
-
Resource Allocation for Energy Efficient Large-Scale Distributed SystemsLee, Young Choon / Zomaya, Albert Y. et al. | 2010
- 20
-
Social Cognitive Theory in IS Research – Literature Review, Criticism, and Research AgendaCarillo, Kévin D. et al. | 2010
- 32
-
Knowledge Intensive Business Processes: A Process-Technology Fit PerspectiveKulkarni, Uday / Ipe, Minu et al. | 2010
- 44
-
A Web Service Similarity Refinement Framework Using Automata ComparisonChen, Lu / Chow, Randy et al. | 2010
- 56
-
A System for Analyzing Advance Bot BehaviorOh, JooHyung / Im, Chaetae / Jeong, HyunCheol et al. | 2010
- 64
-
Two Approaches to Handling Proactivity in Pervasive SystemsPapadopoulou, Elizabeth / Abu Shaaban, Yussuf / Gallacher, Sarah / Taylor, Nick / Williams, M. Howard et al. | 2010
- 76
-
A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy ManagementBera, P. / Ghosh, S. K. / Dasgupta, Pallab et al. | 2010
- 89
-
Proposing Candidate Views for MaterializationVijay Kumar, T. V. / Haider, Mohammad / Kumar, Santosh et al. | 2010
- 99
-
A Fuzzy Reasoning Framework for Resolving Spatial Queries through Service Driven Integration of Heterogeneous Geospatial InformationMukherjee, Indira / Ghosh, S. K. et al. | 2010
- 111
-
Dynamic Web Service Composition Based on Operation Flow SemanticsD’Mello, Demian Antony / Ananthanarayana, V. S. et al. | 2010
- 123
-
Distributed Scheduling of a Network of Adjustable Range Sensors for Coverage ProblemsDhawan, Akshaye / Aung, Aung / Prasad, Sushil K. et al. | 2010
- 133
-
Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based SigncryptionBasu, Atanu / Sengupta, Indranil et al. | 2010
- 145
-
Model-Based Software Reliability PredictionKrishna, G. Sri / Mall, Rajib et al. | 2010
- 156
-
Real-Time Power-Aware Routing Protocol for Wireless Sensor NetworkAl-Jarrah, Omar / Salhieh, Ayad / Qaroush, Aziz et al. | 2010
- 167
-
Document Clustering with Semantic Features and Fuzzy AssociationPark, Sun / An, Dong Un / Cha, ByungRea / Kim, Chul-Won et al. | 2010
- 176
-
Supporting Video Streaming over WiMAX Networks by Enhanced FMIPv6-Based HandoverHuynh, Phuong-Quyen / Jangyodsuk, Pat / Moh, Melody et al. | 2010
- 187
-
Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven MethodsHwang, Junseok / Park, Jihyoun / Altmann, Jorn et al. | 2010
- 198
-
A Socio-Technical Perspective on Computer Mediated Communication: Comparison of Government and Non Government Sectors in IndiaMehra, Payal et al. | 2010
- 210
-
Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and FollowersMoh, Teng-Sheng / Murmann, Alexander J. et al. | 2010
- 221
-
Encouraging Cooperation in Ad-Hoc Mobile-Phone Mesh Networks for Rural ConnectivityRanganathan, Kavitha / Shekhar, Vikramaditya et al. | 2010
- 232
-
Fuzzontology: Resolving Information Mining Ambiguity in Economic Intelligent ProcessOnifade, Olufade Falade Williams / Thiéry, Odile / Osofisan, Adenike Oyinlola / Duffing, Gérald et al. | 2010
- 244
-
Personalizing Web Recommendations Using Web Usage Mining and Web Semantics with Time AttributeMoh, Teng-Sheng / Saxena, Neha Sushil et al. | 2010
- 255
-
Towards Analyzing Data Security Risks in Cloud Computing EnvironmentsSangroya, Amit / Kumar, Saurabh / Dhok, Jaideep / Varma, Vasudeva et al. | 2010
- 266
-
Time-Sequential Emotion Diagnosis Based on the Eye Movement of the User in Support of Web-Based e-LearningNosu, Kiyoshi / Koike, Takeshi / Shigeta, Ayuko et al. | 2010
- 275
-
Critical Success Factors in Managing Virtual TeamsVaidyanathan, Ganesh / Debrot, Carmen et al. | 2010
- 282
-
3D Reconstruction and Camera Pose from Video Sequence Using Multi-dimensional DescentChouvatut, Varin / Madarasmi, Suthep / Tuceryan, Mihran et al. | 2010
- 293
-
Adapting Content Presentation for Mobile Web BrowsingAdipat, Boonlit / Zhang, Dongsong / Zhou, Lina et al. | 2010
- 304
-
Application of Decision Tree Technique to Analyze Construction Project DataDesai, Vijaya S. / Joshi, Sharad et al. | 2010
- 314
-
Effects of Initial Search Bound on the Performance of Self-adaptive Evolutionary Computation MethodsSwain, Anjan Kumar et al. | 2010
- 325
-
A Computational Study of Margining Portfolios of Options by Two ApproachesCoffman, Edward G. Jr. / Matsypura, Dmytro / Timkovsky, Vadim G. et al. | 2010
- 333
-
Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard MapKumar, Anil / Ghose, M. K. et al. | 2010
- 339
-
Linear Multivariable System Reduction Using Particle Swarm Optimization and A Comparative Study Using Relative Integral Square ErrorParmar, Girish / Pandey, Mahendra K. / Kumar, Vijay et al. | 2010
- 348
-
An Anomaly Based Approach for Intrusion Detection by Authorized Users in Database SystemsGupta, Bharat / Arora, Deepak / Jha, Vishal et al. | 2010
- 357
-
Towards a Knowledge Management Portal for a Local CommunityLopez, Marcelo / Isaza, Gustavo / Joyanes, Luis et al. | 2010
- 363
-
Fusion of Speech and Face by Enhanced Modular Neural NetworkKala, Rahul / Vazirani, Harsh / Shukla, Anupam / Tiwari, Ritu et al. | 2010
- 373
-
Mining Rare Events Data by Sampling and Boosting: A Case StudyAu, Tom / Chin, Meei-Ling Ivy / Ma, Guangqin et al. | 2010
- 380
-
Model-Based Regression Test Case PrioritizationPanigrahi, Chhabi Rani / Mall, Rajib et al. | 2010
- 386
-
Software Process Improvement through Experience Management: An Empirical Analysis of Critical Success FactorsSharma, Neeraj / Singh, Kawaljeet / Goyal, D. P. et al. | 2010
- 392
-
A Comparative Feature Selection Approach for the Prediction of Healthcare CoverageSethi, Prerna / Jain, Mohit et al. | 2010
- 404
-
A Grid-Based Scalable Classifier for High Dimensional DatasetsSaini, Sheetal / Dua, Sumeet et al. | 2010