Sciweavers

2570 search results - page 509 / 514
» Constructing a web information system development methodolog...
Sort
View
PODS
2008
ACM
152views Database» more  PODS 2008»
15 years 9 months ago
Towards a theory of schema-mapping optimization
A schema mapping is a high-level specification that describes the relationship between two database schemas. As schema mappings constitute the essential building blocks of data ex...
Ronald Fagin, Phokion G. Kolaitis, Alan Nash, Luci...
KI
2008
Springer
14 years 9 months ago
On Restaurants and Requirements: How Requirements Engineering may be Facilitated by Scripts
Requirements engineering is a central part of software projects. It is assumed that two third of all errors in software projects are caused by forgotten requirements or mutual misu...
Christoph Peylo
BMCBI
2005
107views more  BMCBI 2005»
14 years 9 months ago
Protein subcellular localization prediction for Gram-negative bacteria using amino acid subalphabets and a combination of multip
Background: Predicting the subcellular localization of proteins is important for determining the function of proteins. Previous works focused on predicting protein localization in...
Jiren Wang, Wing-Kin Sung, Arun Krishnan, Kuo-Bin ...
CONCURRENCY
2000
133views more  CONCURRENCY 2000»
14 years 9 months ago
OpenMP versus threading in C/C++
When comparing OpenMP to other parallel programming models, it is easier to choose between OpenMP and MPI than between OpenMP and POSIX Threads (Pthreads). With languages like C a...
Bob Kuhn, Paul Petersen, Eamonn O'Toole
EUROSYS
2008
ACM
15 years 6 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman