Sciweavers

1263 search results - page 55 / 253
» A* with Bounded Costs
Sort
View
CIDM
2007
IEEE
15 years 4 months ago
Distributed Document Clustering Using Word-clusters
−Document clustering has become an increasingly important task in analyzing huge numbers of documents distributed among various sites. The challenging aspect is to analyze this e...
Debzani Deb, Rafal A. Angryk
HASE
1999
IEEE
15 years 2 months ago
Building Dependable Distributed Applications Using AQUA
Building dependable distributed systems using ad hoc methods is a challenging task. Without proper support, an application programmer must face the daunting requirement of having ...
Jennifer Ren, Michel Cukier, Paul Rubel, William H...
TIP
2011
170views more  TIP 2011»
14 years 4 months ago
A New Hybrid Method for Image Approximation Using the Easy Path Wavelet Transform
The Easy Path Wavelet Transform (EPWT) has recently been proposed by one of the authors as a tool for sparse representations of bivariate functions from discrete data, in particul...
Gerlind Plonka, Stefanie Tenorth, Daniela Rosca
ICDE
2004
IEEE
102views Database» more  ICDE 2004»
15 years 11 months ago
Approximate Temporal Aggregation
Temporal aggregate queries retrieve summarized information about records with time-evolving attributes. Existing approaches have at least one of the following shortcomings: (i) th...
Yufei Tao, Dimitris Papadias, Christos Faloutsos
ISAAC
2003
Springer
97views Algorithms» more  ISAAC 2003»
15 years 3 months ago
Equilibria for Networks with Malicious Users
We consider the problem of characterizing user equilibria and optimal solutions for selfish routing in a given network. We extend the known models by considering malicious behavio...
George Karakostas, Anastasios Viglas