Sciweavers

8068 search results - page 1147 / 1614
» Java Data Objects
Sort
View
INFOCOM
2008
IEEE
15 years 11 months ago
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
—The design of computer and communication systems has been based, for decades, on the fundamental assumption that the objective of all users is to improve their own performance. ...
Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy
151
Voted
VISUALIZATION
2005
IEEE
15 years 10 months ago
View-Dependent Rendering of Multiresolution Texture-Atlases
Real-time rendering of massively textured 3D scenes usually involves two major problems: Large numbers of texture switches are a well-known performance bottleneck and the set of s...
Henrik Buchholz, Jürgen Döllner
157
Voted
XIMEP
2004
ACM
108views Database» more  XIMEP 2004»
15 years 10 months ago
The Joy of SAX
Most current XQuery implementations require that all XML data reside in memory in one form or another before they start processing the data. This is unacceptable for large XML doc...
Leonidas Fegaras
ISIPTA
2003
IEEE
120views Mathematics» more  ISIPTA 2003»
15 years 10 months ago
Towards a Chaotic Probability Model for Frequentist Probability: The Univariate Case
We adopt the same mathematical model of a set M of probability measures as is central to the theory of coherent imprecise probability. However, we endow this model with an objecti...
Pablo Ignacio Fierens, Terrence L. Fine
SSD
2001
Springer
218views Database» more  SSD 2001»
15 years 9 months ago
Efficient Mining of Spatiotemporal Patterns
The problem of mining spatiotemporal patterns is finding sequences of events that occur frequently in spatiotemporal datasets. Spatiotemporal datasets store the evolution of object...
Ilias Tsoukatos, Dimitrios Gunopulos
« Prev « First page 1147 / 1614 Last » Next »