Sciweavers

2956 search results - page 449 / 592
» Targeted Data Prefetching
Sort
View
ICDE
2006
IEEE
115views Database» more  ICDE 2006»
15 years 9 months ago
Integration Workbench: Integrating Schema Integration Tools
A key aspect of any data integration endeavor is establishing a transformation that translates instances of one or more source schemata into instances of a target schema. This sch...
Peter Mork, Arnon Rosenthal, Leonard J. Seligman, ...
ICMCS
2006
IEEE
120views Multimedia» more  ICMCS 2006»
15 years 9 months ago
SVM-Based Shot Boundary Detection with a Novel Feature
This paper describes our new algorithm for shot boundary detection and its evaluation. We adopt a 2-stage data fusion approach with SVM technique to decide whether a boundary exis...
Kazunori Matsumoto, Masaki Naito, Keiichiro Hoashi...
IEEEARES
2006
IEEE
15 years 9 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
150
Voted
IEEEPACT
2006
IEEE
15 years 9 months ago
A two-phase escape analysis for parallel java programs
Thread escape analysis conservatively determines which objects may be accessed in more than one thread. Thread escape analysis is useful for a variety of purposes – finding rac...
Kyungwoo Lee, Samuel P. Midkiff
INFOCOM
2006
IEEE
15 years 9 months ago
Controlled Flooding Search with Delay Constraints
— In this paper we consider the problem of query and search in a network, e.g., searching for a specific node or a piece of data. We limit our attention to the class of TTL (tim...
Nicholas B. Chang, Mingyan Liu