Sciweavers

604 search results - page 114 / 121
» Identifying and evaluating community structure in complex ne...
Sort
View
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
15 years 11 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...
DOCENG
2004
ACM
15 years 3 months ago
Instructional information in adaptive spatial hypertext
Spatial hypertext is an effective medium for the delivery of help and instructional information on the Web. Spatial hypertext’s intrinsic features allow documents to visually re...
Luis Francisco-Revilla, Frank M. Shipman III
MOBICOM
2010
ACM
14 years 9 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
BMCBI
2008
121views more  BMCBI 2008»
14 years 9 months ago
ReAlignerV: Web-based genomic alignment tool with high specificity and robustness estimated by species-specific insertion sequen
Background: Detecting conserved noncoding sequences (CNSs) across species highlights the functional elements. Alignment procedures combined with computational prediction of transc...
Hisakazu Iwama, Yukio Hori, Kensuke Matsumoto, Koj...
MSWIM
2009
ACM
15 years 4 months ago
How do wireless chains behave?: the impact of MAC interactions
In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in...
Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...