Sciweavers

2424 search results - page 243 / 485
» A general algorithm for data dependence analysis
Sort
View
KDD
2006
ACM
157views Data Mining» more  KDD 2006»
16 years 4 months ago
Using structure indices for efficient approximation of network properties
Statistics on networks have become vital to the study of relational data drawn from areas such as bibliometrics, fraud detection, bioinformatics, and the Internet. Calculating man...
Matthew J. Rattigan, Marc Maier, David Jensen
INFOCOM
2012
IEEE
13 years 6 months ago
Optimal surface deployment problem in wireless sensor networks
—Sensor deployment is a fundamental issue in a wireless sensor network, which often dictates the overall network performance. Previous studies on sensor deployment mainly focused...
Miao Jin, Guodong Rong, Hongyi Wu, Liang Shuai, Xi...
CVPR
2006
IEEE
16 years 6 months ago
Meta-Evaluation of Image Segmentation Using Machine Learning
Image segmentation is a fundamental step in many computer vision applications. Generally, the choice of a segmentation algorithm, or parameterization of a given algorithm, is sele...
Hui Zhang, Sharath R. Cholleti, Sally A. Goldman, ...
DAGSTUHL
2004
15 years 5 months ago
The Priority R-Tree: A Practically Efficient and Worst-Case-Optimal R-Tree
We present the Priority R-tree, or PR-tree, which is the first R-tree variant that always answers a window query using O((N/B)1-1/d + T/B) I/Os, where N is the number of ddimensio...
Lars Arge, Mark de Berg, Herman J. Haverkort, Ke Y...
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 11 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek