Sciweavers

3356 search results - page 139 / 672
» Thresholds and Expectation Thresholds
Sort
View
104
Voted
DASFAA
2009
IEEE
93views Database» more  DASFAA 2009»
15 years 7 months ago
Top-K Correlation Sub-graph Search in Graph Databases
Recently, due to its wide applications, (similar) subgraph search has attracted a lot of attentions from database and data mining community, such as [13, 18, 19, 5]. In [8], Ke et ...
Lei Zou, Lei Chen 0002, Yansheng Lu
138
Voted
ADC
2008
Springer
156views Database» more  ADC 2008»
15 years 7 months ago
Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream
Mining frequent patterns in a data stream is very challenging for the high complexity of managing patterns with bounded memory against the unbounded data. While many approaches as...
Ming-Yen Lin, Sue-Chen Hsueh, Sheng-Kun Hwang
100
Voted
SBCCI
2005
ACM
111views VLSI» more  SBCCI 2005»
15 years 6 months ago
Total leakage power optimization with improved mixed gates
Gate oxide tunneling current Igate and sub-threshold current Isub dominate the leakage of designs. The latter depends on threshold voltage Vth while Igate vary with the thickness ...
Frank Sill, Frank Grassert, Dirk Timmermann
HICSS
2003
IEEE
150views Biometrics» more  HICSS 2003»
15 years 6 months ago
Adaptive Location Management Strategy Combining Distance-Based Update and Sectional Paging Techniques
In this paper, we develop a new adaptive scheme in which an optimal distance-based update threshold is selected not only as a function of the call-to-mobility ratio, but also as a...
Tracy Tung, Abbas Jamalipour
ICNP
2003
IEEE
15 years 6 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi