Sciweavers

1146 search results - page 199 / 230
» Semantics of Data Streams and Operators
Sort
View
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
15 years 5 months ago
The Scamseek Project - Text Mining for Financial Scams on the Internet
The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Jon Patrick
AAAI
2008
15 years 4 months ago
Enabling the Interoperability of Large-Scale Legacy Systems
Legacy system data models can interoperate only if their syntactic and semantic differences are resolved. To address this problem, we developed the Intelligent Mapping Toolkit (IM...
Kalyan Moy Gupta, Michael Zang, Adam Gray, David W...
119
Voted
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
15 years 3 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...
VLDB
2002
ACM
166views Database» more  VLDB 2002»
15 years 1 months ago
COMA - A System for Flexible Combination of Schema Matching Approaches
Schema matching is the task of finding semantic correspondences between elements of two schemas. It is needed in many database applications, such as integration of web data source...
Hong Hai Do, Erhard Rahm
OSDI
2002
ACM
16 years 2 months ago
Ivy: A Read/Write Peer-to-Peer File System
Ivy is a multi-user read/write peer-to-peer file system. Ivy has no centralized or dedicated components, and it provides useful integrity properties without requiring users to ful...
Athicha Muthitacharoen, Robert Morris, Thomer M. G...