Sciweavers

7978 search results - page 1515 / 1596
» Combining shared-coin algorithms
Sort
View
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 4 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
WABI
2007
Springer
15 years 4 months ago
Shotgun Protein Sequencing
Although snake venom proteins have been proven instrumental in the design of blood clotting and cytostatic breast cancer drugs, the main method in use to sequence these unknown pr...
Pavel A. Pevzner
WISTP
2007
Springer
15 years 4 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz
CGO
2006
IEEE
15 years 3 months ago
Selecting Software Phase Markers with Code Structure Analysis
Most programs are repetitive, where similar behavior can be seen at different execution times. Algorithms have been proposed that automatically group similar portions of a program...
Jeremy Lau, Erez Perelman, Brad Calder
GMP
2006
IEEE
161views Solid Modeling» more  GMP 2006»
15 years 3 months ago
Tracking Point-Curve Critical Distances
This paper presents a novel approach to continuously and robustly tracking critical (geometrically, perpendicular and/or extremal) distances from a moving plane point p ∈ R2 to a...
Xianming Chen, Elaine Cohen, Richard F. Riesenfeld
« Prev « First page 1515 / 1596 Last » Next »