CNRS

Displaying 21 - 30 of 215 results

  • A Survey of RDB to RDF Translation Approaches and Tools

    White Papers // Nov 2013 // provided by CNRS

    Relational databases scattered over the web are generally opaque to regular web crawling tools. To address this concern, many RDB-to-RDF approaches have been proposed over the last years. In this paper, the authors propose a detailed review of RDB-to-RDF methods and tools, considering end-to-end projects that delivered operational tools. The ...

    Download Now
  • A Geometrical Approach for Power Optimization in Relay-Based Cellular Networks

    White Papers // Oct 2013 // provided by CNRS

    Relays are considered as a feasible way to increase coverage and capacity of cellular networks. However, optimization of relay-enhanced networks is still a matter of research. This paper proposes a simple geometrical approach to derive the optimal long-term relay downlink transmit power with the aim of maximizing the average spectral ...

    Download Now
  • On the Validity of Flow-level TCP Network Models for Grid and Cloud Simulations

    White Papers // Oct 2013 // provided by CNRS

    Researchers in the area of grid/cloud computing perform many of their experiments using simulations that must capture network behavior. In this context, packet-level simulations, which are widely used to study network protocols, are too costly given the typical large scales of simulated systems and applications. An alternative is to implement ...

    Download Now
  • Embedded Data on Intelligent Products - Impact on Real-Time Applications

    White Papers // Oct 2013 // provided by CNRS

    New challenges and opportunities arise with the Internet of Things (IoT), making it possible to link any objects of the real world with the virtual one. In recent years, IoT has become increasingly popular in industrial applications (e.g. for the inclusion of data related to the product history). It might ...

    Download Now
  • Fact Checking and Analyzing the Web

    White Papers // Sep 2013 // provided by CNRS

    Tools for authoring electronic content and sharing it through the Internet are very widely adopted by now. First blogs, and then social networks, grew more or less in parallel with the major media providers' move towards allowing users to record their opinions next to the papers. These technical means to ...

    Download Now
  • Leveraging Ontologies upon a Holistic Privacy-aware Access Control Model

    White Papers // Sep 2013 // provided by CNRS

    Access control is a crucial concept in both ICT security and privacy, providing for the protection of system resources and personal data. The increasing complexity of nowadays systems has led to a vast family of solutions fostering comprehensive access control models, with the ability to capture a variety of parameters ...

    Download Now
  • Query Rewriting for Rule Mining in Databases

    White Papers // Sep 2013 // provided by CNRS

    Promoting declarative approaches in data mining is a long standing theme. This paper goes into this direction by proposing a well-founded logical query language, SafeRL, allowing the expression of a wide variety of \"Rules\" to be discovered against the data. SafeRL extends and generalizes functional dependencies in databases to new ...

    Download Now
  • Visual Analysis of Complex Networks for Business Intelligence with Gephi

    White Papers // Sep 2013 // provided by CNRS

    The recent availability of a vast amount of data from Online Social Networks (OSN) and from the Web has opened promising perspectives for the field of Business Intelligence (BI), in particular for the monitoring of brand e-reputation and for the management of customer relationships. Platforms which combine data mining algorithms ...

    Download Now
  • Pre- and Post-Scheduling Memory Allocation Strategies on MPSoCs

    White Papers // Jul 2013 // provided by CNRS

    In this paper, the authors introduce and assesses a new method to allocate memory for applications implemented on a shared memory Multi-Processor System-on-Chip (MPSoC). This method first consists of deriving, from a Synchronous Data-Flow (SDF) algorithm description, a Memory Exclusion Graph (MEG) that models all the memory objects of the ...

    Download Now
  • Towards a Secure Identity Management in Smartphone Environments

    White Papers // Jul 2013 // provided by CNRS

    Mobile network operators are providing identification and authentication means to their subscribers through SIM-cards. IDentity Management (IDM) is a hot topic today for mobile network operators and service providers, especially when the terminal is a Smartphone. This paper addresses the encountered security issues of Smartphone's to support identity management. Then ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?