自制 发表于 2025-3-28 18:08:31

Dhouha Ayed,Chantal Taconet,Nawel Sabri,Guy Bernardser’s destination to visit next. It is important for both the location-based service providers and users. Most of the existing studies have not taken full advantage of spatio-temporal information and user category preference, these are very important for analyzing user preference. Therefore, we prop

值得赞赏 发表于 2025-3-28 19:50:24

Alexandre Alvaro,Daniel Lucrédio,Antonio Francisco do Prado,Eduardo Santana de Almeidawledge graph (KG). Most of end-to-end KGQA approaches only pay attention to answering one-hop simple questions and lack scalability and interpretability. Meanwhile, since the high cost for data annotations, the lack of intermediate supervision signals becomes a major challenge. To address these chal

罗盘 发表于 2025-3-29 02:34:07

Dynamic Publish/Subscribe in Mobile Peer-to-Peer Systemsie between these extremes. The combination of mobile devices and ad-hoc networks is best managed by the creation of highly dynamic, self-organizing, mobile peer-to-peer systems. Asynchronous communication is essential to support anonymous coordination of communication in such ubiquitous environments

丰满中国 发表于 2025-3-29 06:10:42

The Virtual Cooperative Project Taking into Account Work Semantic Meaning in Architectural Cooperatiy act constitutes a round-trip between the designer group and a common base. Design is often conducted in a collective way. Points of view are often shared between contributors and decisions about different project aspects are submitted for common approbation.

表被动 发表于 2025-3-29 08:42:30

Collaborative Fuzzy Agents Using Constraint Logic Programming over Finite Domainshe inference mechanism of Prolog with a fuzzy variant which is able to handle partial truth. Most of these systems implement the fuzzy resolution introduced by Lee, examples being Prolog-Elf, Fril Prolog, and F-Prolog. Truth values associated to fuzzy variables can be represented in an ordeal of dif

blight 发表于 2025-3-29 12:17:54

Design a High-Level Language for Large Network Security Managemently and effectively safeguard large network security for management system. We represent abstract language that supports various functions. This high-level language abstracts the control behavior of the network nodes, which has various setting-up methodology. We shall describe the feature of Triton l

愚蠢人 发表于 2025-3-29 19:18:09

http://reply.papertrans.cn/71/7012/701193/701193_47.png

耕种 发表于 2025-3-29 21:50:39

Access Control-Based Distribution of Shared Documentsde costly multimedia resources, whose management raises important issues due to the constraints imposed by Web technology. This poster presents an approach for distributing shared Web documents to the authoring group’s sites, taking into consideration current organization of the concerned sites, acc

Indict 发表于 2025-3-30 03:41:24

Service-Oriented Architecture of TeleCAREs, at their disposal. The reusability of resources becomes even more important, when considering the continuous development of facilities (e.g. the emerging domotics) and services (e.g. the panic button) in this domain. The overall goal of the TeleCARE project is the provision of a configurable infr

Recessive 发表于 2025-3-30 04:21:05

Feedback Partitioning and Decomposition-Oriented Analysis of Cyclic Workflow Graphsodes according to the feedback structure and derivation of acyclic subgraphs are illustrated. We also introduce the concepts of two-phased verification of control flows and decomposition-oriented analysis, which is generally easier to comprehend and verify individually than the whole workflow model.
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops; OTM Confederated Int Robert Meersman,Zahir Tari,Angelo Corsaro Confere