Sciweavers

1134 search results - page 116 / 227
» Optimizing Designs based on Risk Approach
Sort
View
CIKM
2007
Springer
15 years 4 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
15 years 10 months ago
QoX-driven ETL design: reducing the cost of ETL consulting engagements
As business intelligence becomes increasingly essential for organizations and as it evolves from strategic to operational, the complexity of Extract-Transform-Load (ETL) processes...
Alkis Simitsis, Kevin Wilkinson, Malú Caste...
BMCBI
2005
79views more  BMCBI 2005»
14 years 10 months ago
Mathematical design of prokaryotic clone-based microarrays
Background: Clone-based microarrays, on which each spot represents a random genomic fragment, are a good alternative to open reading frame-based microarrays, especially for microo...
Bart Pieterse, Elisabeth J. Quirijns, Frank H. J. ...
MOBICOM
2009
ACM
15 years 4 months ago
Dynamic spectrum access in DTV whitespaces: design rules, architecture and algorithms
In November 2008, the FCC ruled that the digital TV whitespaces be used for unlicensed access. This is an exciting development because DTV whitespaces are in the low frequency ran...
Supratim Deb, Vikram Srinivasan, Ritesh Maheshwari
COOPIS
2004
IEEE
15 years 1 months ago
Semantic Web Based Content Enrichment and Knowledge Reuse in E-science
We address the life cycle of semantic web based knowledge management from ontology modelling to instance generation and reuse. We illustrate through a semantic web based knowledge ...
Feng Tao, Liming Chen, Nigel Shadbolt, Fenglian Xu...