The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Legacy system data models can interoperate only if their syntactic and semantic differences are resolved. To address this problem, we developed the Intelligent Mapping Toolkit (IM...
Kalyan Moy Gupta, Michael Zang, Adam Gray, David W...
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Schema matching is the task of finding semantic correspondences between elements of two schemas. It is needed in many database applications, such as integration of web data source...
Ivy is a multi-user read/write peer-to-peer file system. Ivy has no centralized or dedicated components, and it provides useful integrity properties without requiring users to ful...
Athicha Muthitacharoen, Robert Morris, Thomer M. G...