Sciweavers

36320 search results - page 7100 / 7264
» From Code to Models
Sort
View
ICDT
2005
ACM
131views Database» more  ICDT 2005»
15 years 9 months ago
Algorithms for the Database Layout Problem
We present a formal analysis of the database layout problem, i.e., the problem of determining how database objects such as tables and indexes are assigned to disk drives. Optimizin...
Gagan Aggarwal, Tomás Feder, Rajeev Motwani...
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 9 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
122
Voted
LOCA
2005
Springer
15 years 9 months ago
Classifying the Mobility of Users and the Popularity of Access Points
Abstract. There is increasing interest in location-aware systems and applications. It is important for any designer of such systems and applications to understand the nature of use...
Minkyong Kim, David Kotz
MLCW
2005
Springer
15 years 9 months ago
Evaluating Predictive Uncertainty Challenge
This Chapter presents the PASCAL1 Evaluating Predictive Uncertainty Challenge, introduces the contributed Chapters by the participants who obtained outstanding results, and provide...
Joaquin Quiñonero Candela, Carl Edward Rasm...
NIME
2005
Springer
134views Music» more  NIME 2005»
15 years 9 months ago
Haptic Music Exercises
Pluck, ring, rub, bang, strike, and squeeze are all simple gestures used in controlling music. A single motor/encoder plus a force-sensor has proved to be a useful platform for ex...
William Verplank
« Prev « First page 7100 / 7264 Last » Next »