Sciweavers

535 search results - page 35 / 107
» Insertion and Expansion Operations for
Sort
View
CSREAEEE
2006
182views Business» more  CSREAEEE 2006»
15 years 1 months ago
NGOSS-based convergent OSS framework using BPM for converged e-business environment
Recently, most wired telecom service carriers are faced to decreasing of the number of subscriber because of the expansion of wireless market and blocking of net earnings. To over...
Cheol-Seong Kim, Byung-Soo Chang, Sung-il Kim
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 27 days ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
SWAT
2004
Springer
153views Algorithms» more  SWAT 2004»
15 years 5 months ago
Melding Priority Queues
We show that any priority queue data structure that supports insert, delete, and find-min operations in pq(n) time, when n is an upper bound on the number of elements in the prio...
Ran Mendelson, Robert Endre Tarjan, Mikkel Thorup,...
SWAT
1992
Springer
147views Algorithms» more  SWAT 1992»
15 years 3 months ago
Efficient Rebalancing of Chromatic Search Trees
In PODS'91, Nurmi and Soisalon-Soininen presented a new type of binary search tree for databases, which they call a chromatic tree. The aim is to improve runtime performance ...
Joan Boyar, Kim S. Larsen
DOCENG
2008
ACM
15 years 1 months ago
Merging changes in XML documents using reliable context fingerprints
Different dialects of XML have emerged as ubiquitous document exchange formats. For effective collaboration based on such documents, the capability to propagate edit operations pe...
Sebastian Rönnau, Christian Pauli, Uwe M. Bor...