Sciweavers

5344 search results - page 436 / 1069
» Privacy-Preserving Set Operations
Sort
View
SEMWEB
2007
Springer
15 years 11 months ago
Structure Preserving Semantic Matching
Abstract The most common matching applications, e.g., ontology matching, focus on the computation of the correspondences holding between the nodes of graph structures (e.g., concep...
Fausto Giunchiglia, Mikalai Yatskevich, Fiona McNe...
CSMR
2006
IEEE
15 years 11 months ago
Package Patterns for Visual Architecture Recovery
Recovering the architecture is the first step towards reengineering a software system. Many reverse engineering tools use top-down exploration as a way of providing a visual and ...
Mircea Lungu, Michele Lanza, Tudor Gîrba
GLOBECOM
2006
IEEE
15 years 11 months ago
Logical Topology Design and Interface Assignment for Multi-Channel Wireless Mesh Networks
Abstract— A multi-channel wireless mesh network (MCWMN) consists of a number of stationary wireless routers, where each router is equipped with multiple network interface cards (...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong
IISWC
2006
IEEE
15 years 11 months ago
Performance Cloning: A Technique for Disseminating Proprietary Applications as Benchmarks
Many embedded real world applications are intellectual property, and vendors hesitate to share these proprietary applications with computer architects and designers. This poses a ...
Ajay Joshi, Lieven Eeckhout, Robert H. Bell Jr., L...
IISWC
2006
IEEE
15 years 11 months ago
MineBench: A Benchmark Suite for Data Mining Workloads
Abstract— Data mining constitutes an important class of scientific and commercial applications. Recent advances in data extraction techniques have created vast data sets, which ...
Ramanathan Narayanan, Berkin Özisikyilmaz, Jo...