Sciweavers

4166 search results - page 269 / 834
» Automating the constraining process
Sort
View
TIT
2002
128views more  TIT 2002»
15 years 3 months ago
Bandwidth scaling for fading multipath channels
Abstract--We show that very large bandwidths on fading multipath channels cannot be effectively utilized by spread-spectrum systems that (in a particular sense) spread the availabl...
Muriel Médard, Robert G. Gallager
JCIT
2010
172views more  JCIT 2010»
14 years 11 months ago
Conditional Sensor Deployment Using Evolutionary Algorithms
Sensor deployment is a critical issue, as it affects the cost and detection capabilities of a wireless sensor network. Although many previous efforts have addressed this issue, mo...
M. Sami Soliman, Guanzheng Tan
CIKM
2011
Springer
14 years 4 months ago
Conkar: constraint keyword-based association discovery
In many domains, such as bioinformatics, cheminformatics, health informatics and social networks, data can be represented naturally as labeled graphs. To address the increasing ne...
Mo Zhou, Yifan Pan, Yuqing Wu
SIGMOD
2012
ACM
202views Database» more  SIGMOD 2012»
13 years 6 months ago
MCJoin: a memory-constrained join for column-store main-memory databases
There exists a need for high performance, read-only mainmemory database systems for OLAP-style application scenarios. Most of the existing works in this area are centered around t...
Steven Keith Begley, Zhen He, Yi-Ping Phoebe Chen
SIGMOD
2012
ACM
222views Database» more  SIGMOD 2012»
13 years 6 months ago
Tiresias: a demonstration of how-to queries
In this demo, we will present Tiresias, the first how-to query engine. How-to queries represent fundamental data analysis questions of the form: “How should the input change in...
Alexandra Meliou, Yisong Song, Dan Suciu