Sciweavers

1061 search results - page 146 / 213
» Integrity Constraints for Linked Data
Sort
View
NAR
2011
331views Computer Vision» more  NAR 2011»
13 years 5 months ago
Community cyberinfrastructure for Advanced Microbial Ecology Research and Analysis: the CAMERA resource
The Community Cyberinfrastructure for Advanced Microbial Ecology Research and Analysis (CAMERA, http://camera.calit2.net/) is a database and associated computational infrastructur...
Shulei Sun, Jing Chen, Weizhong Li, Ilkay Altintas...
ICDCSW
2003
IEEE
14 years 3 months ago
Gateway: A Message Hub with Store-and-Forward Messaging in Mobile Networks
To obtain good performance in messaging over mobile networks, we have developed a Gateway. Gateway is a message hub that transmits information using store-and-forward messaging an...
Eiko Yoneki, Jean Bacon
ACTAC
2008
94views more  ACTAC 2008»
13 years 10 months ago
Effect Preservation in Transaction Processing in Rule Triggering Systems
Rules provide an expressive means for implementing database behavior: They cope with changes and their ramifications. Rules are commonly used for integrity enforcement, i.e., for ...
Mira Balaban, Steffen Jurk
NAR
2011
214views Computer Vision» more  NAR 2011»
13 years 25 days ago
DAnCER: Disease-Annotated Chromatin Epigenetics Resource
Chromatin modification (CM) is a set of epigenetic processes that govern many aspects of DNA replication, transcription and repair. CM is carried out by groups of physically inter...
Andrei L. Turinsky, Brian Turner, Rosanne C. Borja...
IICAI
2007
13 years 11 months ago
Logics for Action
Logics of action, for reasoning about the effects of state change, and logics of belief, accounting for belief revision and update, have much in common. Furthermore, we may underta...
Michael P. Fourman