Sciweavers

4052 search results - page 810 / 811
» Using RDF to describe networks
Sort
View
164
Voted
GI
2009
Springer
15 years 1 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
134
Voted
COMPUTER
2010
127views more  COMPUTER 2010»
15 years 23 days ago
Data Stream Management Systems for Computational Finance
Computational finance leverages computer technologies to build models from large amounts of data to extract insight. In today's networked world, the amount of data available t...
Badrish Chandramouli, Mohamed H. Ali, Jonathan Gol...
157
Voted
BMCBI
2010
160views more  BMCBI 2010»
14 years 10 months ago
eHive: An Artificial Intelligence workflow system for genomic analysis
Background: The Ensembl project produces updates to its comparative genomics resources with each of its several releases per year. During each release cycle approximately two week...
Jessica Severin, Kathryn Beal, Albert J. Vilella, ...
SFM
2011
Springer
253views Formal Methods» more  SFM 2011»
14 years 6 months ago
Application-Layer Connector Synthesis
The heterogeneity characterizing the systems populating the Ubiquitous Computing environment prevents their seamless interoperability. Heterogeneous protocols may be willing to coo...
Paola Inverardi, Romina Spalazzese, Massimo Tivoli
AAAI
2008
15 years 5 months ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...