Sciweavers

7651 search results - page 1357 / 1531
» Information integration in the enterprise
Sort
View
TCS
2008
15 years 1 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
TFS
2008
174views more  TFS 2008»
15 years 1 months ago
Type-2 Fuzzy Markov Random Fields and Their Application to Handwritten Chinese Character Recognition
In this paper, we integrate type-2 (T2) fuzzy sets with Markov random fields (MRFs) referred to as T2 FMRFs, which may handle both fuzziness and randomness in the structural patter...
Jia Zeng, Zhi-Qiang Liu
TKDE
2008
121views more  TKDE 2008»
15 years 1 months ago
Schema Matching Using Interattribute Dependencies
Schema matching is one of the key challenges in information integration. It is a labor-intensive and time-consuming process. To alleviate the problem, many automated solutions have...
Jaewoo Kang, Jeffrey F. Naughton
JCB
2007
106views more  JCB 2007»
15 years 1 months ago
Clustered Sequence Representation for Fast Homology Search
We present a novel approach to managing redundancy in sequence databanks such as GenBank. We store clusters of near-identical sequences as a representative union-sequence and a se...
Michael Cameron, Yaniv Bernstein, Hugh E. Williams
JCM
2007
87views more  JCM 2007»
15 years 1 months ago
Optimization of Radio Measurements Exploitation in Wireless Mobile Networks
— Radio measurements play a crucial role in mobile wireless networks as they are input of Radio Resource Management (RRM) mechanisms, needed to assess mobile network reliability ...
Afef Ben Hadj Alaya-Feki, Alain Le Cornec, Eric Mo...
« Prev « First page 1357 / 1531 Last » Next »