Sciweavers

31686 search results - page 6295 / 6338
» Resource typing in Guru
Sort
View
JACM
2010
120views more  JACM 2010»
13 years 4 months ago
The structure of inverses in schema mappings
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Alan Nash
JAIR
2010
181views more  JAIR 2010»
13 years 4 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
JCST
2010
155views more  JCST 2010»
13 years 4 months ago
Efficient Location Updates for Continuous Queries over Moving Objects
Abstract The significant overhead related to frequent location updates from moving objects often results in poor performance. As most of the location updates do not affect the quer...
Yu-Ling Hsueh, Roger Zimmermann, Wei-Shinn Ku
JIPS
2010
138views more  JIPS 2010»
13 years 4 months ago
A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking Sy
In order to provide a tailored education for learners within the ubiquitous environment, it is critical to undertake an analysis of the learning activities of learners. For this pu...
Hyung-Min Lim, Kun-Won Jang, Byung-Gi Kim
JLP
2010
96views more  JLP 2010»
13 years 4 months ago
An overview of the K semantic framework
K is an executable semantic framework in which programming languages, calculi, as well as type systems or formal analysis tools can be defined making use of configurations, comput...
Grigore Rosu, Traian-Florin Serbanuta
« Prev « First page 6295 / 6338 Last » Next »