Sciweavers

2229 search results - page 367 / 446
» Comparative analysis of biclustering algorithms
Sort
View
DEBS
2007
ACM
14 years 2 months ago
On adding replies to publish-subscribe
Recently, the publish-subscribe communication model has attracted the attention of developers as a viable alternative to traditional communication schemas, like request/reply, for...
Gianpaolo Cugola, Matteo Migliavacca, Alessandro M...
ICDCS
2010
IEEE
14 years 2 months ago
A New Buffer Cache Design Exploiting Both Temporal and Content Localities
: This paper presents a Least Popularly Used buffer cache algorithm to exploit both temporal locality and content locality of I/O requests. Popular data blocks are selected as refe...
Jin Ren, Qing Yang
APWEB
2006
Springer
14 years 1 months ago
Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links
A Connected Dominating Set (CDS) can serve as a virtual backbone for a wireless sensor network since there is no fixed infrastructure or centralized management in wireless sensor n...
Ding-Zhu Du, My T. Thai, Yingshu Li, Dan Liu, Shiw...
CAISE
2006
Springer
14 years 1 months ago
An Efficient Approach to Support Querying Secure Outsourced XML Information
Abstract. Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption propos...
Yin Yang, Wilfred Ng, Ho Lam Lau, James Cheng
3DIM
2001
IEEE
14 years 1 months ago
Comparison of HK and SC Curvature Description Methods
This paper compares two different local surface shape description methods. The general goal of surface shape description methods is to classify different surface shapes from range...
H. Cantzler, Robert B. Fisher