Sciweavers

3477 search results - page 153 / 696
» From Tables to Frames
Sort
View
PAM
2005
Springer
14 years 2 months ago
Revisiting Internet AS-Level Topology Discovery
Abstract. The development of veracious models of the Internet topology has received a lot of attention in the last few years. Many proposed models are based on topologies derived f...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, G...
MIDDLEWARE
2004
Springer
14 years 2 months ago
Meghdoot: Content-Based Publish/Subscribe over P2P Networks
Publish/Subscribe systems have become a prevalent model for delivering data from producers (publishers) to consumers (subscribers) distributed across wide-area networks while decou...
Abhishek Gupta, Ozgur D. Sahin, Divyakant Agrawal,...
DMDW
2000
118views Management» more  DMDW 2000»
13 years 10 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
BMCBI
2006
81views more  BMCBI 2006»
13 years 9 months ago
A fisheye viewer for microarray-based gene expression data
Background: Microarray has been widely used to measure the relative amounts of every mRNA transcript from the genome in a single scan. Biologists have been accustomed to reading t...
Min Wu, Cheng Thao, Xiangming Mu, Ethan V. Munson
ICGA
2008
100views Optimization» more  ICGA 2008»
13 years 9 months ago
Learning the Piece Values for Three Chess Variants
A set of experiments for learning the values of chess pieces is described for the popular chess variants Crazyhouse Chess, Suicide Chess, and Atomic Chess. We follow an establishe...
Sacha Droste, Johannes Fürnkranz