Sciweavers

1061 search results - page 112 / 213
» Integrity Constraints for Linked Data
Sort
View
ICSE
2011
IEEE-ACM
14 years 5 months ago
Miler: a toolset for exploring email data
Source code is the target and final outcome of software development. By focusing our research and analysis on source code only, we risk forgetting that software is the product of...
Alberto Bacchelli, Michele Lanza, Marco D'Ambros
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
13 years 4 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
BMCBI
2008
78views more  BMCBI 2008»
15 years 1 months ago
Genome Environment Browser (GEB): a dynamic browser for visualising high-throughput experimental data in the context of genome f
Background: There is accumulating evidence that the milieu of repeat elements and other nongenic sequence features at a given chromosomal locus, here defined as the genome environ...
Derek Huntley, Y. Amy Tang, Tatyana B. Nesterova, ...
CIKM
2004
Springer
15 years 7 months ago
Extending and inferring functional dependencies in schema transformation
We study the representation, derivation and utilization of a special kind of constraints in multidatabase systems. A major challenge is when component database schemas are schemat...
Qi He, Tok Wang Ling
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
15 years 8 months ago
RDFStats - An Extensible RDF Statistics Generator and Library
—In this paper RDFStats is introduced, which is a generator for statistics of RDF sources like SPARQL endpoints and RDF documents. RDFStats does not only provide a statistics gen...
Andreas Langegger, Wolfram Wöß