Sciweavers

15781 search results - page 2975 / 3157
» Evaluating Information Extraction
Sort
View
SEMWEB
2001
Springer
15 years 8 months ago
The ICS-FORTH RDFSuite: Managing Voluminous RDF Description Bases
Metadata are widely used in order to fully exploit information resources available on corporate intranets or the Internet. The Resource Description Framework (RDF) aims at facilit...
Sofia Alexaki, Vassilis Christophides, Gregory Kar...
HPDC
2000
IEEE
15 years 8 months ago
dQUOB: Managing Large Data Flows using Dynamic Embedded Queries
The dQUOB system satis es client need for speci c information from high-volume data streams. The data streams we speak of are the ow of data existing during large-scale visualizat...
Beth Plale, Karsten Schwan
ICDCS
2000
IEEE
15 years 8 months ago
Scheduling Heuristics for Data Requests in an Oversubscribed Network with Priorities and Deadlines
Providing up-to-date input to users’ applications is an important data management problem for a distributed computing environment, where each data storage location and intermedi...
Mitchell D. Theys, Noah Beck, Howard Jay Siegel, M...
NOMS
2000
IEEE
118views Communications» more  NOMS 2000»
15 years 8 months ago
On the enhancement of a differentiated services scheme
Simple Integrated Media Access (SIMA) is a differentiated service scheme based on drop preference bits in every packet. The basic idea of the SIMA is to maximize the exploitation ...
Runtong Zhang, Jian Ma
ASPLOS
2000
ACM
15 years 8 months ago
Software Profiling for Hot Path Prediction: Less is More
Recently, there has been a growing interest in exploiting profile information in adaptive systems such as just-in-time compilers, dynamic optimizers and, binary translators. In th...
Evelyn Duesterwald, Vasanth Bala
« Prev « First page 2975 / 3157 Last » Next »