Sciweavers

17471 search results - page 3344 / 3495
» Information Modeling
Sort
View
BMCBI
2011
14 years 11 months ago
Comparing genotyping algorithms for Illumina's Infinium whole-genome SNP BeadChips
Background: Illumina’s Infinium SNP BeadChips are extensively used in both small and large-scale genetic studies. A fundamental step in any analysis is the processing of raw all...
Matthew E. Ritchie, Ruijie Liu, Benilton Carvalho,...
PODS
2004
ACM
158views Database» more  PODS 2004»
16 years 4 months ago
Composing Schema Mappings: Second-Order Dependencies to the Rescue
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
MOBIHOC
2007
ACM
16 years 3 months ago
Bounds for the capacity of wireless multihop networks imposed by topology and demand
Existing work on the capacity of wireless networks predominantly considers homogeneous random networks with random work load. The most relevant bounds on the network capacity, e.g...
Alireza Keshavarz-Haddad, Rudolf H. Riedi
SIGCOMM
2006
ACM
15 years 9 months ago
Growth codes: maximizing sensor network data persistence
Sensor networks are especially useful in catastrophic or emergency scenarios such as floods, fires, terrorist attacks or earthquakes where human participation may be too dangero...
Abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rube...
CCS
2011
ACM
14 years 3 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
« Prev « First page 3344 / 3495 Last » Next »