Sciweavers

720 search results - page 56 / 144
» Evaluating Database Selection Techniques: A Testbed and Expe...
Sort
View
ASPLOS
2004
ACM
15 years 5 months ago
Scalable selective re-execution for EDGE architectures
Pipeline flushes are becoming increasingly expensive in modern microprocessors with large instruction windows and deep pipelines. Selective re-execution is a technique that can r...
Rajagopalan Desikan, Simha Sethumadhavan, Doug Bur...
EWSN
2009
Springer
15 years 6 months ago
DHV: A Code Consistency Maintenance Protocol for Multi-hop Wireless Sensor Networks
Ensuring that every sensor node has the same code version is challenging in dynamic, unreliable multi-hop sensor networks. When nodes have different code versions, the network may...
Thanh Dang, Nirupama Bulusu, Wu-chi Feng, Seungweo...
ICSOC
2004
Springer
15 years 5 months ago
Toward autonomic web services trust and selection
Emerging Web services standards enable the development of large-scale applications in open environments. In particular, they enable services to be dynamically bound. However, curr...
E. Michael Maximilien, Munindar P. Singh
ECIR
1998
Springer
15 years 1 months ago
Content Based Annotation and Retrieval in RAIDER
A new system, RAIDER (Retrieval and Annotation of Image Databases), has been developed for the management of image databases. RAIDER was designed to combat the inadequacies and in...
Stephanie R. Fountain, Tieniu Tan
ICPR
2008
IEEE
15 years 6 months ago
On the selection of base prototypes for LAESA and TLAESA classifiers
—The k nearest neighbor (k-NN) classifier has been extensively used as a nonparametric technique in Pattern Recognition. However, in some applications where the training set is l...
Selene Hernández-Rodríguez, Jos&eacu...