排序方式: 共有21条查询结果,搜索用时 31 毫秒
1.
Structured document storage and refined declarative and navigational access mechanisms in HyperStorM 总被引:2,自引:0,他引:2
Klemens Böhm Karl Aberer Erich J. Neuhold Xiaoya Yang 《The VLDB Journal The International Journal on Very Large Data Bases》1997,6(4):296-311
The combination of SGML and database technology allows to refine both declarative and navigational access mechanisms for
structured document collection: with regard to declarative access, the user can formulate complex information needs without
knowing a query language, the respective document type definition (DTD) or the underlying modelling. Navigational access is
eased by hyperlink-rendition mechanisms going beyond plain link-integrity checking. With our approach, the database-internal
representation of documents is configurable. It allows for an efficient implementation of operations, because DTD knowledge
is not needed for document structure recognition. We show how the number of method invocations and the cost of parsing can
be significantly reduced.
Edited by Y.C. Tay. Received April 22, 1996 / Accepted March 16, 1997 相似文献
2.
A Breitwieser C Mader I Schocher K Hoffmann-Sommergruber W Aberer O Scheiner UB Sleytr M Sára 《Canadian Metallurgical Quarterly》1998,53(8):786-793
The incidence of allergy to airborne proteins derived from tree and grass pollen, feces of mites, spores of molds, and pet dander has been increasing over the last decades. Since precise diagnosis is a prerequisite for successful immunotherapy, there is a rising demand for rapid, reliable, and inexpensive screening methods such as dipstick assays. With the purified recombinant major birch-pollen allergen rBet v 1a as model protein, crystalline bacterial cell-surface layers (S-layers) were tested for their applicability as an immobilization matrix for dipstick development. For this purpose, S-layers were deposited on a mechanically stable microporous support, cross-linked with glutaraldehyde, and free carboxylic acid groups of the S-layer protein were activated with carbodiimide. In the present test system, rBet v 1a was immobilized via the monoclonal mouse antibody BIP 1, which, unlike the allergen, is too large to enter the pores of the S-layer lattice, and which therefore formed a closed monolayer on the outermost surface of the crystal lattice. Moreover, BIP 1 is known to modulate IgE binding to the allergen. After incubation of the dipsticks in serum, washing of the reaction zone under tap water, and binding of an anti-IgE alkaline phosphatase conjugate, 5-bromo-4-chloro-3-indolyl phosphate/nitro blue tetrazolium was used as substrate, forming an IgE concentration-dependent colored precipitate on the S-layer surface. The investigation of patient sera previously tested with the CAP system confirmed the specificity of the S-layer-based dipstick assay. Since the dipstick is easy to handle and the whole test procedure takes only 90 min, this test system should be applicable for rapid determination of specific IgE and for first screening in the doctor's practice. 相似文献
3.
Heylighen F. Gershenson C. Staab S. Flake G.W. Pennock D.M. Fain D.C. De Roure D. Aberer K. Wei-Min Shen Dousse O. Thiran P. 《Intelligent Systems, IEEE》2003,18(4):72-86
Principles of self-organisation are presented and are applied to the fields of the Web, which has developed its form from the bottom up; e-science, in which a grid of intelligent components interacted towards a greater understanding of the science concerned; peer-to-peer systems, that lend themselves to information systems that do not work with centralized authority; software and hardware agents; and mobile applications, which often defy centralized control. 相似文献
4.
5.
Berker Agir Thanasis G. Papaioannou Rammohan Narendula Karl Aberer Jean-Pierre Hubaux 《GeoInformatica》2014,18(1):165-191
The participatory sensing paradigm, through the growing availability of cheap sensors in mobile devices, enables applications of great social and business interest, e.g., electrosmog exposure measurement and early earthquake detection. However, users’ privacy concerns regarding their activity traces need to be adequately addressed as well. The existing static privacy-enabling approaches, which hide or obfuscate data, offer some protection at the expense of data value. These approaches do not offer privacy guarantees and heterogeneous user privacy requirements cannot be met by them. In this paper, we propose a user-side privacy-protection scheme; it adaptively adjusts its parameters, in order to meet personalized location-privacy protection requirements against adversaries in a measurable manner. As proved by simulation experiments with artificial- and real-data traces, when feasible, our approach not only always satisfies personal location-privacy concerns, but also maximizes data utility (in terms of error, data availability, area coverage), as compared to static privacy-protection schemes. 相似文献
6.
One fundamental issue with existing reputation systems, particularly those implemented in open and decentralized environments, is whitewashing attacks by opportunistic participants. If identities are cheap, it is beneficial for a rational provider to simply defect when selling services to its clients, leave the system to avoid punishment and then rejoin with a new identity. Current work usually assumes the existence of an effective identity management scheme to avoid the problem, without proposing concrete solutions to directly prevent this unwanted behavior. This article presents and analyzes an incentive mechanism to effectively motivate honesty of rationally opportunistic providers in the aforementioned scenario, by eliminating incentives of providers to change their identities. The main idea is to give each provider an identity premium, with which the provider may sell services at higher prices depending on the duration of its presence in the system. Our price‐based incentive mechanism, implemented with the use of a reputation‐based provider selection protocol and a reverse auction scheme, is shown to significantly reduce the impact of malicious and strategic ratings, while still allowing explicit competition among the providers. It is proven that if the temporary cheating gain by a provider is bounded and small and given a trust model with a reasonable low error bound in identifying malicious ratings, our approach can effectively eliminate irrationally malicious providers and enforce honest behavior of rationally opportunistic ones, even when cheap identities are available. We suggest an identity premium function that helps such honesty to be sustained given a certain cost of identities and analyze incentives of participants in accepting the proposed premium. Related implementation issues in different application scenarios are also discussed. 相似文献
7.
Twenty years ago, a concept of psoriasis pathogenesis was proposed in which epidermal proliferation of psoriatic lesions was the consequence of immunological abnormalities. This concept has subsequently been supported by the remarkable efficacy of immunosuppressive drugs. Moreover, recent experimental data indicate that activated psoriatic lymphocytes are capable of inducing keratinocyte proliferation. However, we have still to explain the mechanism by which lymphocytes act on keratinocytes and to find out what antigenic material could be responsible for their activation. 相似文献
8.
Sarunas Girdzijauskas Wojciech Galuba Vasilios Darlagiannis Anwitaman Datta Karl Aberer 《Peer-to-Peer Networking and Applications》2011,4(3):259-273
Many structured overlay networks rely on a ring invariant as a core network connectivity element. The responsibility ranges
of the participating peers and navigability principles (greedy routing) heavily depend on the ring structure. For correctness
guarantees, each node needs to eagerly maintain its immediate neighboring links - the ring invariant. However, the ring maintenance
is an expensive task and it may not even be possible to maintain the ring invariant continuously under high churn, particularly
as the network size grows. Furthermore, routing anomalies in the network, peers behind firewalls and Network Address Translators
(NATs) create non-transitivity effects, which inevitably lead to the violation of the ring invariant. We argue that reliance
on the ring structure is a serious impediment for real life deployment and scalability of structured overlays. In this paper
we propose an overlay called Fuzzynet, which does not rely on the ring invariant, yet has all the functionalities of structured
overlays. Fuzzynet takes the idea of lazy overlay maintenance further by dropping any explicit connectivity and data maintenance
requirement, relying merely on the actions performed when new Fuzzynet peers join the network. We show that with sufficient
amount of neighbors (O(log N), comparable to traditional structured over-lays), even under high churn, data can be retrieved in Fuzzynet w.h.p. We validate
our novel design principles by simulations as well as PlanetLab experiments and compare them with ring based overlays. 相似文献
9.
A sliding-window k-NN query (k-NN/w query) continuously monitors incoming data stream objects within a sliding window to identify k closest objects to a query. It enables effective filtering of data objects streaming in at high rates from potentially distributed sources, and offers means to control the rate of object insertions into result streams. Therefore k-NN/w processing systems may be regarded as one of the prospective solutions for the information overload problem in applications that require processing of structured data in real-time, such as the Sensor Web. Existing k-NN/w processing systems are mainly centralized and cannot cope with multiple data streams, where data sources are scattered over the Internet. In this paper, we propose a solution for distributed continuous k-NN/w processing of structured data from distributed streams. We define a k-NN/w processing model for such setting, and design a distributed k-NN/w processing system on top of the Content-Addressable Network (CAN) overlay. An extensive evaluation using both real and synthetic data sets demonstrates the feasibility of the proposed solution because it balances the load among the peers, while the messaging overhead within the P2P network remains reasonable. Moreover, our results clearly show the solution is scalable for an increasing number of queries and peers. 相似文献
10.