Sciweavers

41 search results - page 2 / 9
» Distributed Transitive Closure Computations: The Disconnecti...
Sort
View
SIGMOD
2010
ACM
239views Database» more  SIGMOD 2010»
13 years 10 months ago
Computing label-constraint reachability in graph databases
Our world today is generating huge amounts of graph data such as social networks, biological networks, and the semantic web. Many of these real-world graphs are edge-labeled graph...
Ruoming Jin, Hui Hong, Haixun Wang, Ning Ruan, Yan...
PDP
2005
IEEE
13 years 10 months ago
Rendezvous: An Alternative Approach to Conflict Resolution for Real Time Multi-User Applications
Up until now little support has been provided for shared state systems in environments with highly unpredictable network connections, such as mobile networks. Shared state conflic...
Angie Chandler, Joe Finney
CONCUR
1991
Springer
13 years 8 months ago
A Tool Set for deciding Behavioral Equivalences
This paper deals with verification methods based on equivalence relations between labeled transition systems. More precisely, we are concerned by two practical needs: how to effi...
Jean-Claude Fernandez, Laurent Mounier
CVPR
2004
IEEE
14 years 7 months ago
Detecting Unusual Activity in Video
We present an unsupervised technique for detecting unusual activity in a large video set using many simple features. No complex activity models and no supervised feature selection...
Hua Zhong, Jianbo Shi, Mirkó Visontai
EUC
2004
Springer
13 years 10 months ago
The 3DMA Middleware for Mobile Applications
Abstract. Mobile devices have received much research interest in recent years. Mobility raises new issues such as more dynamic context, limited computing resources, and frequent di...
Tore Fjellheim, Stephen Milliner, Marlon Dumas, Ki...