Sciweavers

687 search results - page 120 / 138
» Specification and Verification of Model Transformations Usin...
Sort
View
MOBIHOC
2009
ACM
14 years 9 months ago
Characterizing the exit process of a non-saturated IEEE 802.11 wireless network
In this paper, we consider a non-saturated IEEE 802.11 based wireless network. We use a three-way fixed point to model the node behavior with Bernoulli packet arrivals and determi...
Punit Rathod, Onkar Dabeer, Abhay Karandikar, Anir...
NIPS
2008
13 years 10 months ago
Inferring rankings under constrained sensing
Motivated by applications like elections, web-page ranking, revenue maximization etc., we consider the question of inferring popular rankings using constrained data. More specific...
Srikanth Jagabathula, Devavrat Shah
ADBIS
2004
Springer
122views Database» more  ADBIS 2004»
14 years 2 months ago
Implementing a Query Language for Context-Dependent Semistructured Data
Abstract. In today’s global environment, the structure and presentation of information may depend on the underlying context of the user. To address this issue, in previous work w...
Yannis Stavrakas, Kostis Pristouris, Antonis Efand...
DASFAA
2003
IEEE
146views Database» more  DASFAA 2003»
14 years 2 months ago
Cost-Driven Storage Schema Selection for XML
Various models and approaches have been proposed for mapping XML data into relational tables recently. Most of those approaches produce relational schema for given XML data, based...
Shihui Zheng, Ji-Rong Wen, Hongjun Lu
CAISE
2003
Springer
14 years 2 months ago
A Framework for the Design of ETL Scenarios
Extraction-Transformation-Loading (ETL) tools are pieces of software responsible for the extraction of data from several sources, their cleansing, customization and insertion into ...
Panos Vassiliadis, Alkis Simitsis, Panos Georganta...