Sciweavers

1995 search results - page 178 / 399
» What's the Problem
Sort
View
IJHPCA
2006
105views more  IJHPCA 2006»
15 years 4 months ago
Advances, Applications and Performance of the Global Arrays Shared Memory Programming Toolkit
This paper describes capabilities, evolution, performance, and applications of the Global Arrays (GA) toolkit. GA was created to provide application programmers with an interface ...
Jarek Nieplocha, Bruce Palmer, Vinod Tipparaju, Ma...
JODS
2008
179views Data Mining» more  JODS 2008»
15 years 4 months ago
A Cooperative Approach for Composite Ontology Mapping
This paper proposes a cooperative approach for composite ontology mapping. We first present an extended classification of automated ontology matching and propose an automatic compo...
Cássia Trojahn dos Santos, Márcia Cr...
JUCS
2006
137views more  JUCS 2006»
15 years 4 months ago
Progress in Quantum Computational Cryptography
: Shor's algorithms for the integer factorization and the discrete logarithm problems can be regarded as a negative effect of the quantum mechanism on publickey cryptography. ...
Akinori Kawachi, Takeshi Koshiba
JUCS
2006
116views more  JUCS 2006»
15 years 4 months ago
Extension of CQL over Dynamic Databases
: CQL, Continuous Query Language is suitable for data stream queries. Sometimes it is better if the queries operate on relational databases and data streams simultaneously. The exe...
Antal Buza
ESWA
2007
117views more  ESWA 2007»
15 years 4 months ago
An HMM for detecting spam mail
Hidden Markov Models, or HMMs for short, have been recently used in Bioinformatics for the classification of DNA or protein chains, giving rise to what is known as Profile Hidde...
José Gordillo, Eduardo Conde