Sciweavers

2703 search results - page 372 / 541
» Optimizing memory transactions
Sort
View
126
Voted
DEXA
2009
Springer
127views Database» more  DEXA 2009»
15 years 10 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder
132
Voted
ADBIS
2006
Springer
182views Database» more  ADBIS 2006»
15 years 9 months ago
A Middleware-Based Approach to Database Caching
Database caching supports declarative query processing close to the application. Using a full-fledged DBMS as cache manager, it enables the evaluation of specific project-select-...
Andreas Bühmann, Theo Härder, Christian ...
148
Voted
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
15 years 4 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
111
Voted
IPL
2007
72views more  IPL 2007»
15 years 3 months ago
How to safely close a discussion
In the secure communication problem, we focus on safe termination. In applications such as electronic transactions, we want each party to be ensured that both sides agree on the s...
Gildas Avoine, Serge Vaudenay
220
Voted
TWC
2010
14 years 10 months ago
MMSE Based Transceiver Designs in Closed-Loop Non-Regenerative MIMO Relaying Systems
In this paper, we propose a new design strategy based on the minimum mean-squared error (MMSE) in closedloop non-regenerative multiple-input multiple-output (MIMO) relaying system...
Chang-Ick Song, Kyoung-Jae Lee, Inkyu Lee