Sciweavers

7839 search results - page 1530 / 1568
» What's Clicking What
Sort
View
PVLDB
2010
159views more  PVLDB 2010»
13 years 9 months ago
Explore or Exploit? Effective Strategies for Disambiguating Large Databases
Data ambiguity is inherent in applications such as data integration, location-based services, and sensor monitoring. In many situations, it is possible to “clean”, or remove, ...
Reynold Cheng, Eric Lo, Xuan Yang, Ming-Hay Luk, X...
PVLDB
2010
163views more  PVLDB 2010»
13 years 9 months ago
Event Processing - past, present and future
Analysts have marked Event Processing as the most growing segment in enterprise computing during years 2008 and 2009, furthermore, this trend is expected to continue. Many of the ...
Opher Etzion
RR
2010
Springer
13 years 9 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
SEE
2010
Springer
13 years 9 months ago
Can Instruction in Engineering Ethics Change Students' Feelings about Professional Responsibility?
How can a course on engineering ethics affect an undergraduate student’s feelings of responsibility about moral problems? In this study, three groups of students were interviewed...
Golnaz Hashemian, Michael C. Loui
TCSB
2010
13 years 9 months ago
Biomodel Engineering - From Structure to Behavior
Biomodel engineering is the science of designing, constructing and analyzing computational models of biological systems. It forms a systematic and powerful extension of earlier mat...
Rainer Breitling, Robin Donaldson, David R. Gilber...
« Prev « First page 1530 / 1568 Last » Next »