Sciweavers

2169 search results - page 355 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
I3
2007
15 years 6 months ago
Performing Object Consolidation on the Semantic Web Data Graph
An important aspect of Semantic Web technologies is the issue of identity and uniquely identifying resources, which is essential for integrating data across sources. Currently, th...
Aidan Hogan, Andreas Harth, Stefan Decker
CGF
2010
155views more  CGF 2010»
15 years 4 months ago
SmallWorlds: Visualizing Social Recommendations
We present SmallWorlds, a visual interactive graph-based interface that allows users to specify, refine and build item-preference profiles in a variety of domains. The interface f...
Brynjar Gretarsson, John O'Donovan, Svetlin Bostan...
TIT
1998
69views more  TIT 1998»
15 years 4 months ago
Relationships Between the Constant Modulus and Wiener Receivers
— The Godard or the constant modulus algorithm (CMA) is an effective technique for blind receiver design in communications. However, due to the complexity of the Constant Modulus...
Hanks H. Zeng, Lang Tong, C. Richard Johnson Jr.
PVLDB
2010
179views more  PVLDB 2010»
15 years 2 months ago
MRShare: Sharing Across Multiple Queries in MapReduce
Large-scale data analysis lies in the core of modern enterprises and scientific research. With the emergence of cloud computing, the use of an analytical query processing infrast...
Tomasz Nykiel, Michalis Potamias, Chaitanya Mishra...
TMC
2010
230views more  TMC 2010»
15 years 2 months ago
Bandwidth Recycling in IEEE 802.16 Networks
—IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS). Bandwidth is reserved for each application to ensure the QoS. Fo...
D. Chuck, J. M. Chang