Sciweavers

1202 search results - page 235 / 241
» Knowledge as a Service and Knowledge Breaching
Sort
View
DKE
2007
130views more  DKE 2007»
14 years 9 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
SIGMETRICS
2008
ACM
142views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization
Time synchronization is an essential service in distributed computing and control systems. It is used to enable tasks such as synchronized data sampling and accurate time-offlight...
Thomas Schmid, Zainul Charbiwala, Jonathan Friedma...
108
Voted
IJSNET
2007
169views more  IJSNET 2007»
14 years 9 months ago
ART: an asymmetric and reliable transport mechanism for wireless sensor networks
: Many applications developed for wireless sensor networks (WSNs) demand for Reliable communication service, since majority of these applications are event-critical applications. T...
Nurcan Tezcan, Wenye Wang
IJSWIS
2007
138views more  IJSWIS 2007»
14 years 9 months ago
Using a Natural Language Understanding System to Generate Semantic Web Content
We describe our research on automatically generating rich semantic annotations of text and making it available on the Semantic Web. In particular, we discuss the challenges involv...
Akshay Java, Sergei Nirenburg, Marjorie McShane, T...
72
Voted
JKM
2007
126views more  JKM 2007»
14 years 9 months ago
The moderating role of human capital management practices on employee capabilities
Purpose – The purpose of this paper is to suggest and empirically test a model that explains employee capabilities from the knowledge-based perspective. In this model, human cap...
Nick Bontis, Alexander Serenko