Sciweavers

10909 search results - page 123 / 2182
» Evaluating Backup Algorithms
Sort
View
124
Voted
SBBD
2003
101views Database» more  SBBD 2003»
15 years 5 months ago
Cherry Picking: A Semantic Query Processing Strategy for the Evaluation of Expensive Predicates
A common requirement of many scientific applications is the ability to process queries involving expensive predicates corresponding to user programs. Optimizing such queries is ha...
Fabio Porto, Eduardo Sany Laber, Patrick Valduriez
145
Voted
CLOUDCOM
2010
Springer
15 years 1 months ago
Evaluation of MapReduce for Gridding LIDAR Data
-- The MapReduce programming model, introduced by Google, has become popular over the past few years as a mechanism for processing large amounts of data, using sharednothing parall...
Sriram Krishnan, Chaitanya K. Baru, Christopher J....
104
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Analysis and Algorithms for Content-Based Event Matching
    Content-based  event  matching  is  an  important  problem  in  large-scale  event-based  publish/subscribe  systems.  However,  open  questions  remain  in ...
Satyen Kale, Elad Hazan, Fengyun Cao, Jaswinder Pa...
154
Voted
PAMI
2006
186views more  PAMI 2006»
15 years 3 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
122
Voted
DSN
2009
IEEE
15 years 10 months ago
Comparing anomaly-detection algorithms for keystroke dynamics
Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since man...
Kevin S. Killourhy, Roy A. Maxion