Sciweavers

35419 search results - page 220 / 7084
» How are we doing
Sort
View
133
Voted
ER
2007
Springer
97views Database» more  ER 2007»
15 years 10 months ago
Augmenting Traditional Conceptual Models to Accommodate XML Structural Constructs
Although it is possible to present XML Schema graphically, resentations do not raise the level of abstraction for XML schemata in the same way traditional conceptual models raise t...
Reema Al-Kamha, David W. Embley, Stephen W. Liddle
131
Voted
ACSC
2006
IEEE
15 years 10 months ago
On pedagogically sound examples in public-key cryptography
Pencil-and-paper exercises in public-key cryptography are important in learning the subject. It is desirable that a student doing such an exercise does not get the right answer by...
Suan Khai Chong, Graham Farr, Laura Frost, Simon H...
SIGMOD
2008
ACM
158views Database» more  SIGMOD 2008»
16 years 4 months ago
How NOT to review a paper: the tools and techniques of the adversarial reviewer
There are several useful guides available for how to review a paper in Computer Science [10, 6, 12, 7, 2]. These are soberly presented, carefully reasoned and sensibly argued. As ...
Graham Cormode
144
Voted
CSE
2009
IEEE
15 years 11 months ago
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Manuel Cebrián, Enrique Frías-Mart&i...
EKAW
2010
Springer
15 years 3 months ago
How Much Semantic Data on Small Devices?
Abstract. Semantic tools such as triple stores, reasoners and query engines tend to be designed for large-scale applications. However, with the rise of sensor networks, smart-phone...
Mathieu d'Aquin, Andriy Nikolov, Enrico Motta