Sciweavers

3299 search results - page 627 / 660
» A general mathematics of names
Sort
View
ICDT
2010
ACM
161views Database» more  ICDT 2010»
15 years 3 months ago
Data Correspondence, Exchange, and Repair
Checking the correspondence between two or more database instances and enforcing it is a procedure widely used in practice without however having been explored from a theoretical ...
Gösta Grahne, Adrian Onet
ICDT
2010
ACM
193views Database» more  ICDT 2010»
15 years 2 months ago
Data correspondence, exchange and repair
Checking the correspondence between two or more database instances and enforcing it is a procedure widely used in practice without however having been explored from a theoretical ...
Gösta Grahne, Adrian Onet
MOBISYS
2008
ACM
15 years 2 months ago
Community sensor grids: virtualization for sharing across domains
Wireless sensor networks have been traditionally designed to be privately owned and used. Hence the two hallmark features of sensor networks, namely customized network application...
Amiya Bhattacharya, Meddage S. Fernando, Partha Da...
ATAL
2008
Springer
15 years 1 months ago
A few good agents: multi-agent social learning
In this paper, we investigate multi-agent learning (MAL) in a multi-agent resource selection problem (MARS) in which a large group of agents are competing for common resources. Si...
Jean Oh, Stephen F. Smith
CEAS
2008
Springer
15 years 1 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown