Sciweavers

1061 search results - page 52 / 213
» A general definition of malware
Sort
View
INFSOF
2002
72views more  INFSOF 2002»
13 years 9 months ago
Translating object-oriented database transactions into relational transactions
In this paper, we present methods of translating transactions from object-oriented database(OODB) to relational database(RDB). The process involves schema mapping in data definiti...
Joseph Fong
SOCIALCOM
2010
13 years 7 months ago
Churn in Social Networks: A Discussion Boards Case Study
Churn has been identified as an important issue in a wide range of industries. In social networks, churn represents a significant risk for the health and functioning of communities...
Marcel Karnstedt, Tara Hennessy, Jeffrey Chan, Con...
ESAW
2009
Springer
13 years 7 months ago
Thinking Integral: How to Build Complex Systems That Live with People and Exhibit Collective Intelligence
009), which constitutes an abstraction of the various aspects of a MAS, generalizing the AGR approach and incorporating the institutional work of Searle (Searle 1995). This model i...
Jacques Ferber
SIGCSE
2009
ACM
137views Education» more  SIGCSE 2009»
14 years 10 months ago
The hidden injuries of overloading 'ADT'
commonly stated definition of abstract data type (ADT) is that it is a domain of values and the operations over that domain. So, for example, a language's built-in types, lik...
Duane Buck, David J. Stucki
SIGMOD
2005
ACM
119views Database» more  SIGMOD 2005»
14 years 10 months ago
DogmatiX Tracks down Duplicates in XML
Duplicate detection is the problem of detecting different entries in a data source representing the same real-world entity. While research abounds in the realm of duplicate detect...
Melanie Weis, Felix Naumann