Sciweavers

2989 search results - page 213 / 598
» Using Domain-Independent Problems for Introducing Formal Met...
Sort
View
JNW
2006
63views more  JNW 2006»
15 years 2 months ago
MAC Contention in a Wireless LAN with Noncooperative Anonymous Stations
In ad hoc wireless LANs populated by mutually impenetrable groups of anonymous stations, honest stations are prone to "bandwidth stealing" by selfish stations. The proble...
Jerzy Konorski
127
Voted
TCS
2008
15 years 2 months ago
Verification of qualitative Z constraints
We introduce an LTL-like logic with atomic formulae built over a constraint language interpreting variables in Z. The constraint language includes periodicity constraints, comparis...
Stéphane Demri, Régis Gascon
KSEM
2010
Springer
15 years 28 days ago
Discovery of Relation Axioms from the Web
Given the proven usefulness of ontologies in many areas, the representation of logical axioms associated to ontological concepts and relations has become an important task in order...
Luis Del Vasto Terrientes, Antonio Moreno, David S...
FAST
2009
15 years 9 days ago
On Explicit Provenance Management in RDF/S Graphs
The notion of RDF Named Graphs has been proposed in order to assign provenance information to data described using RDF triples. In this paper, we argue that named graphs alone can...
Panagiotis Pediaditis, Giorgos Flouris, Irini Fund...
IDA
2009
Springer
15 years 7 days ago
Ontology-Driven KDD Process Composition
Abstract. One of the most interesting challenges in Knowledge Discovery in Databases (KDD) eld is giving support to users in the composition of tools for forming a valid and useful...
Claudia Diamantini, Domenico Potena, Emanuele Stor...