Sciweavers

2504 search results - page 412 / 501
» Using Probabilistic Information in Data Integration
Sort
View
133
Voted
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 9 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
BMCBI
2005
116views more  BMCBI 2005»
15 years 2 months ago
Which gene did you mean?
Computational Biology needs computer-readable information records. Increasingly, meta-analysed and pre-digested information is being used in the follow up of high throughput exper...
Barend Mons
ICDT
2012
ACM
251views Database» more  ICDT 2012»
13 years 4 months ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
139
Voted
KIVS
2009
Springer
15 years 9 months ago
Query Processing and System-Level Support for Runtime-Adaptive Sensor Networks
We present an integrated approach for supporting in-network sensor data processing in dynamic and heterogeneous sensor networks. The concept relies on data stream processing techni...
Falko Dressler, Rüdiger Kapitza, Michael Daum...
110
Voted
OTM
2007
Springer
15 years 8 months ago
Discovering Executable Semantic Mappings Between Ontologies
Creating executable semantic mappings is an important task for ontology-based information integration. Although it is argued that mapping tools may require interaction from humans ...
Han Qin, Dejing Dou, Paea LePendu