Sciweavers

736 search results - page 135 / 148
» Confidence-Aware Join Algorithms
Sort
View
ISCC
2006
IEEE
129views Communications» more  ISCC 2006»
14 years 3 months ago
A Semantic Overlay Network for P2P Schema-Based Data Integration
Abstract— Today data sources are pervasive and their number is growing tremendously. Current tools are not prepared to exploit this unprecedented amount of information and to cop...
Carmela Comito, Simon Patarin, Domenico Talia
BIBE
2005
IEEE
14 years 3 months ago
Improved Phylogenetic Motif Detection Using Parsimony
We have recently demonstrated (La et al, Proteins, 58:2005) that sequence fragments approximating the overall familial phylogeny, called phylogenetic motifs (PMs), represent a pro...
Usman Roshan, Dennis R. Livesay, David La
ICDCS
2005
IEEE
14 years 3 months ago
ZAL: Zero-Maintenance Address Allocation in Mobile Wireless Ad Hoc Networks
— The allocation of IP addresses in hybrid wireless networks is one of the most critical issues in all-IP converged wireless networks. The reason is that centralized IP address a...
Zhihua Hu, Baochun Li
SKG
2005
IEEE
14 years 3 months ago
Effective Maintenance of Materialized Views in Peer Data Management Systems
Materialized view is a useful tool to cache data in data warehouse, data replication, data visualization and etc. However, view maintenance in peer data management systems (PDMSs) ...
Biao Qin, Shan Wang, Xiaoyong Du
DBISP2P
2005
Springer
131views Database» more  DBISP2P 2005»
14 years 3 months ago
Symmetric Replication for Structured Peer-to-Peer Systems
Structured peer-to-peer systems rely on replication as a basic means to provide fault-tolerance in presence of high churn. Most select replicas using either multiple hash functions...
Ali Ghodsi, Luc Onana Alima, Seif Haridi