Sciweavers

1056 search results - page 107 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
EDBT
2008
ACM
173views Database» more  EDBT 2008»
14 years 10 months ago
SeMap: a generic mapping construction system
Most previous schema mapping works focus on creating mappings in specific data models for data transformation, failing to capture a richer set of possible relationships between sc...
Ting Wang, Rachel Pottinger
PERCOM
2007
ACM
14 years 9 months ago
Overhearing the Wireless Interface for 802.11-Based Positioning Systems
Not only the communication capabilities of 802.11, but also the capability to determine the position of mobile devices make 802.11 highly appealing for many application areas. Typ...
Thomas King, Thomas Haenselmann, Stephan Kopf, Wol...
PERCOM
2007
ACM
14 years 9 months ago
MaLM: Machine Learning Middleware to Tackle Ontology Heterogeneity
We envisage pervasive computing applications to be predominantly engaged in knowledge-based interactions, where services and information will be found and exchanged based on some ...
Licia Capra
SDM
2009
SIAM
185views Data Mining» more  SDM 2009»
14 years 7 months ago
Understanding Importance of Collaborations in Co-authorship Networks: A Supportiveness Analysis Approach.
Co-authorship networks, an important type of social networks, have been studied extensively from various angles such as degree distribution analysis, social community extraction a...
Bin Zhou 0002, Jian Pei, Yan Jia, Yi Han
ICCAD
2001
IEEE
126views Hardware» more  ICCAD 2001»
14 years 7 months ago
Constraint Satisfaction for Relative Location Assignment and Scheduling
Tight data- and timing constraints are imposed by communication and multimedia applications. The architecture for the embedded processor imply resource constraints. Instead of ran...
Carlos A. Alba Pinto, Bart Mesman, Jochen A. G. Je...