Sciweavers

5263 search results - page 1039 / 1053
» Open Constraint Optimization
Sort
View
MOBICOM
2010
ACM
14 years 12 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
SIGMOD
2010
ACM
210views Database» more  SIGMOD 2010»
14 years 12 months ago
Searching trajectories by locations: an efficiency study
Trajectory search has long been an attractive and challenging topic which blooms various interesting applications in spatial-temporal databases. In this work, we study a new probl...
Zaiben Chen, Heng Tao Shen, Xiaofang Zhou, Yu Zhen...
ICDE
2010
IEEE
266views Database» more  ICDE 2010»
14 years 12 months ago
Ranking for data repairs
Abstract— Improving data quality is a time-consuming, laborintensive and often domain specific operation. A recent principled approach for repairing dirty database is to use dat...
Mohamed Yakout, Ahmed K. Elmagarmid, Jennifer Nevi...
ADHOC
2007
169views more  ADHOC 2007»
14 years 12 months ago
Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems
Ensuring the consistency and the availability of replicated data in highly mobile ad hoc networks is a challenging task because of the lack of a backbone infrastructure. Previous ...
Daniela Tulone
82
Voted
BMCBI
2007
108views more  BMCBI 2007»
14 years 12 months ago
Publishing perishing? Towards tomorrow's information architecture
Scientific articles are tailored to present information in human-readable aliquots. Although the Internet has revolutionized the way our society thinks about information, the trad...
Michael R. Seringhaus, Mark B. Gerstein
« Prev « First page 1039 / 1053 Last » Next »