Sciweavers

7280 search results - page 109 / 1456
» Optimization Techniques
Sort
View
ICDE
2010
IEEE
562views Database» more  ICDE 2010»
16 years 27 days ago
Multi-Guarded Safe Zone: An Effective Technique to Monitor Moving Circular Range Queries
Given a positive value r, a circular range query returns the objects that lie within the distance r of the query location. In this paper, we study the circular range queries that c...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
CN
2006
116views more  CN 2006»
15 years 1 months ago
Techniques for available bandwidth measurement in IP networks: A performance comparison
As the Internet grows in scale and complexity, the need for accurate traffic measurement increases. Among the different parameters relevant to traffic measurement, the paper pays ...
Leopoldo Angrisani, Salvatore D'Antonio, Marcello ...
KDD
2001
ACM
359views Data Mining» more  KDD 2001»
16 years 1 months ago
Data mining techniques to improve forecast accuracy in airline business
Predictive models developed by applying Data Mining techniques are used to improve forecasting accuracy in the airline business. In order to maximize the revenue on a flight, the ...
Christoph Hueglin, Francesco Vannotti
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 7 months ago
Applying Techniques from Frame Synchronization for Biological Sequence Analysis
— During the last years, the amount of genetic data available has increased rapidly which creates the demand for advanced techniques for their interpretation. In the following, w...
Johanna Weindl, Joachim Hagenauer
MSS
2007
IEEE
100views Hardware» more  MSS 2007»
15 years 7 months ago
Efficient Logging and Replication Techniques for Comprehensive Data Protection
Mariner is an iSCSI-based storage system that is de­ signed to provide comprehensive data protection on com­ modity ATA disk and Gigabit Ethernet technologies while offering the...
Maohua Lu, Shibiao Lin, Tzi-cker Chiueh