Sciweavers

144 search results - page 22 / 29
» Application-Level Isolation Using Data Inconsistency Detecti...
Sort
View
ICDE
2006
IEEE
134views Database» more  ICDE 2006»
14 years 8 months ago
ISOMER: Consistent Histogram Construction Using Query Feedback
Database columns are often correlated, so that cardinality estimates computed by assuming independence often lead to a poor choice of query plan by the optimizer. Multidimensional...
Utkarsh Srivastava, Peter J. Haas, Volker Markl, M...
ICCV
1999
IEEE
14 years 9 months ago
A Bidirectional Matching Algorithm for Deformable Pattern Detection with Application to Handwritten Word Retrieval
A Bayesian framework for deformable pattern classification has been proposed in [1] with promising results for isolated handwritten character recognition. Its performance, however...
Kwok-Wai Cheung, Dit-Yan Yeung, Roland T. Chin
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 1 months ago
Outlier Detection for Fine-grained Load Balancing in Database Clusters
Recent industry trends towards reducing the costs of ownership in large data centers emphasize the need for database system techniques for both automatic performance tuning and ef...
Jin Chen, Gokul Soundararajan, Madalin Mihailescu,...
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
14 years 28 days ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
DSN
2009
IEEE
14 years 2 months ago
Comparing anomaly-detection algorithms for keystroke dynamics
Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since man...
Kevin S. Killourhy, Roy A. Maxion