Sciweavers

7751 search results - page 1490 / 1551
» Data streams: algorithms and applications
Sort
View
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
15 years 5 months ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
GECCO
2010
Springer
191views Optimization» more  GECCO 2010»
15 years 5 months ago
Initialization parameter sweep in ATHENA: optimizing neural networks for detecting gene-gene interactions in the presence of sma
Recent advances in genotyping technology have led to the generation of an enormous quantity of genetic data. Traditional methods of statistical analysis have proved insufficient i...
Emily Rose Holzinger, Carrie C. Buchanan, Scott M....
GECCO
2010
Springer
254views Optimization» more  GECCO 2010»
15 years 5 months ago
Evolving viral marketing strategies
One method of viral marketing involves seeding certain consumers within a population to encourage faster adoption of the product throughout the entire population. However, determi...
Forrest Stonedahl, William Rand, Uri Wilensky
104
Voted
SIGMOD
1998
ACM
124views Database» more  SIGMOD 1998»
15 years 4 months ago
An Alternative Storage Organization for ROLAP Aggregate Views Based on Cubetrees
The Relational On-Line Analytical Processing (ROLAP) is emerging as thedominant approach in data warehousing with decision support applications. In order to enhance query performa...
Yannis Kotidis, Nick Roussopoulos
105
Voted
SIGMOD
1998
ACM
96views Database» more  SIGMOD 1998»
15 years 4 months ago
Wavelet-Based Histograms for Selectivity Estimation
Query optimization is an integral part of relational database management systems. One important task in query optimization is selectivity estimation, that is, given a query P, we ...
Yossi Matias, Jeffrey Scott Vitter, Min Wang
« Prev « First page 1490 / 1551 Last » Next »