Sciweavers

1061 search results - page 114 / 213
» An Experimental Study of Data Migration Algorithms
Sort
View
141
Voted
ISI
2003
Springer
15 years 9 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
138
Voted
PVLDB
2008
137views more  PVLDB 2008»
15 years 3 months ago
Flashing up the storage layer
In the near future, commodity hardware is expected to incorporate both flash and magnetic disks. In this paper we study how the storage layer of a database system can benefit from...
Ioannis Koltsidas, Stratis Viglas
134
Voted
DASFAA
2011
IEEE
177views Database» more  DASFAA 2011»
14 years 7 months ago
Optimizing Incremental Maintenance of Minimal Bisimulation of Cyclic Graphs
Abstract. Graph-structured databases have numerous recent applications including the Semantic Web, biological databases and XML, among many others. In this paper, we study the main...
Jintian Deng, Byron Choi, Jianliang Xu, Sourav S. ...
139
Voted
IPMI
2005
Springer
15 years 9 months ago
Fundamental Limits in 3D Landmark Localization
This work analyses the accuracy of estimating the location of 3D landmarks and characteristic image structures. Based on nonlinear estimation theory we study the minimal stochastic...
Karl Rohr
139
Voted
ICDE
2012
IEEE
203views Database» more  ICDE 2012»
13 years 6 months ago
Parameter-Free Determination of Distance Thresholds for Metric Distance Constraints
—The importance of introducing distance constraints to data dependencies, such as differential dependencies (DDs) [28], has recently been recognized. The metric distance constrai...
Shaoxu Song, Lei Chen 0002, Hong Cheng