Sciweavers

278 search results - page 44 / 56
» Model Management and Schema Mappings: Theory and Practice
Sort
View
CHI
2009
ACM
15 years 10 months ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios
GLOBECOM
2008
IEEE
15 years 4 months ago
A Graph-Based Approach to Multi-Cell OFDMA Downlink Resource Allocation
— A novel, practical and low-complexity multi-cell OFDMA downlink channel assignment method using a graphbased approach is proposed in this work. The inter-cell interference (ICI...
Yu-Jung Chang, Zhifeng Tao, Jinyun Zhang, C. C. Ja...
AGI
2011
14 years 1 months ago
Three Hypotheses about the Geometry of Mind
What set of concepts and formalizations might one use to make a practically useful, theoretically rigorous theory of generally intelligent systems? We present a novel perspective m...
Ben Goertzel, Matthew Iklé
CCS
2008
ACM
14 years 12 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
DEXA
2009
Springer
127views Database» more  DEXA 2009»
15 years 4 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder