Sciweavers

2180 search results - page 367 / 436
» Algorithms for discovering bucket orders from data
Sort
View
92
Voted
CIKM
2005
Springer
15 years 6 months ago
Incremental evaluation of a monotone XPath fragment
This paper shows a scheme for incremental evaluation of XPath queries. Here, we focus on a monotone fragment of XPath, i.e., when a data is deleted from (or inserted to) the datab...
Hidetaka Matsumura, Keishi Tajima
96
Voted
MIR
2004
ACM
110views Multimedia» more  MIR 2004»
15 years 6 months ago
Symbolic representation and retrieval of moving object trajectories
Searching moving object trajectories of video databases has been applied to many fields, such as video data analysis, content-based video retrieval, video scene classification. ...
Lei Chen 0002, M. Tamer Özsu, Vincent Oria
CDC
2009
IEEE
189views Control Systems» more  CDC 2009»
15 years 5 months ago
Maximizing aggregated revenue in sensor networks under deadline constraints
Abstract— We study the problem of maximizing the aggregated revenue in sensor networks with deadline constraints. Our model is that of a sensor network that is arranged in the fo...
Srikanth Hariharan, Ness B. Shroff
111
Voted
IWANN
2009
Springer
15 years 5 months ago
A Soft Computing System to Perform Face Milling Operations
In this paper we present a soft computing system developed to optimize the face milling operation under High Speed conditions in the manufacture of steel components like molds with...
Raquel Redondo, Pedro Santos, Andrés Bustil...
93
Voted
USENIX
2003
15 years 2 months ago
Using Read-Copy-Update Techniques for System V IPC in the Linux 2.5 Kernel
Read-copy update (RCU) allows lock-free read-only access to data structures that are concurrently modified on SMP systems. Despite the concurrent modifications, read-only access...
Andrea Arcangeli, Mingming Cao, Paul E. McKenney, ...