Sciweavers

4193 search results - page 742 / 839
» Linking Data to Ontologies
Sort
View
ISCA
2008
IEEE
136views Hardware» more  ISCA 2008»
13 years 10 months ago
A Randomized Queueless Algorithm for Breadth-First Search
First Come First Served is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems [28, 11], scheduling web ...
K. Subramani, Kamesh Madduri
ISI
2008
Springer
13 years 10 months ago
Using "Cited by" Information to Find the Context of Research Papers
This paper proposes a novel method of analyzing data to find important information about the context of research papers. The proposed CCTVA (Collecting, Cleaning, Translating, Visu...
Chun-Hung Lu, Chih-Chien Wang, Min-Yuh Day, Chorng...
CORR
2007
Springer
162views Education» more  CORR 2007»
13 years 10 months ago
Exploiting Social Annotation for Automatic Resource Discovery
Information integration applications, such as mediators or mashups, that require access to information resources currently rely on users manually discovering and integrating them ...
Anon Plangprasopchok, Kristina Lerman
CORR
2007
Springer
133views Education» more  CORR 2007»
13 years 10 months ago
Blind Identification of Distributed Antenna Systems with Multiple Carrier Frequency Offsets
In spatially distributed multiuser antenna systems, the received signal contains multiple carrier-frequency offsets (CFOs) arising from mismatch between the oscillators of transmi...
Yuanning Yu, Athina P. Petropulu, H. Vincent Poor
ISI
2006
Springer
13 years 10 months ago
Suspect Vehicle Identification for Border Safety with Modified Mutual Information
The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. ...
Siddharth Kaza, Yuan Wang, Hsinchun Chen