Sciweavers

6110 search results - page 1164 / 1222
» Approximate Computing
Sort
View
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
16 years 4 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
142
Voted
KDD
2010
ACM
252views Data Mining» more  KDD 2010»
15 years 6 months ago
Fast query execution for retrieval models based on path-constrained random walks
Many recommendation and retrieval tasks can be represented as proximity queries on a labeled directed graph, with typed nodes representing documents, terms, and metadata, and labe...
Ni Lao, William W. Cohen
CIKM
2006
Springer
15 years 6 months ago
Mining compressed commodity workflows from massive RFID data sets
Radio Frequency Identification (RFID) technology is fast becoming a prevalent tool in tracking commodities in supply chain management applications. The movement of commodities thr...
Hector Gonzalez, Jiawei Han, Xiaolei Li
128
Voted
JGO
2008
101views more  JGO 2008»
15 years 2 months ago
Dynamic equilibria of group vaccination strategies in a heterogeneous population
Abstract In this paper we present an evolutionary variational inequality model of vaccination strategies games in a population with a known vaccine coverage profile over a certain ...
Monica-Gabriela Cojocaru
SIGMOD
2009
ACM
184views Database» more  SIGMOD 2009»
16 years 3 months ago
Minimizing the communication cost for continuous skyline maintenance
Existing work in the skyline literature focuses on optimizing the processing cost. This paper aims at minimization of the communication overhead in client-server architectures, wh...
Zhenjie Zhang, Reynold Cheng, Dimitris Papadias, A...
« Prev « First page 1164 / 1222 Last » Next »