Sciweavers

1240 search results - page 107 / 248
» Composition with Target Constraints
Sort
View
ER
1995
Springer
109views Database» more  ER 1995»
15 years 1 months ago
Reverse Engineering of Relational Database Applications
Abstract. This paper presents techniques for reverse engineering of relational database applications. The target of such an effort is the definition of a fully equipped object-orie...
Mark W. W. Vermeer, Peter M. G. Apers
ISTA
2004
14 years 11 months ago
A Data Transformation Method Based on Schema Mapping
: Schema mapping is an important approach to solve the problem of data integration. This paper introduces a research prototype called SDE, which is a system for managing and facili...
You Li, Dongbo Liu, Weiming Zhang
MPC
2010
Springer
246views Mathematics» more  MPC 2010»
14 years 12 months ago
Abstraction of Object Graphs in Program Verification
ion of Object Graphs in Program Verification Yifeng Chen1 and J.W. Sanders2 1 HCST Key Lab at School of EECS, Peking University, China. 2 UNU-IIST, Macao. A set-theoretic formalism...
Yifeng Chen, Jeff W. Sanders
BMCBI
2010
102views more  BMCBI 2010»
14 years 10 months ago
Alignment and clustering of phylogenetic markers - implications for microbial diversity studies
Background: Molecular studies of microbial diversity have provided many insights into the bacterial communities inhabiting the human body and the environment. A common first step ...
James Robert White, Saket Navlakha, Niranjan Nagar...
WIOPT
2011
IEEE
14 years 1 months ago
Portfolio optimization in secondary spectrum markets
—In this paper, we address the spectrum portfolio optimization (SPO) question in the context of secondary spectrum markets, where bandwidth (spectrum access rights) can be bought...
Praveen Kumar Muthuswamy, Koushik Kar, Aparna Gupt...