Sciweavers

10608 search results - page 1902 / 2122
» Complexity of O'Hara's Algorithm
Sort
View
CONEXT
2010
ACM
13 years 8 months ago
SecondNet: a data center network virtualization architecture with bandwidth guarantees
In this paper, we propose virtual data center (VDC) as the unit of resource allocation for multiple tenants in the cloud. VDCs are more desirable than physical data centers becaus...
Chuanxiong Guo, Guohan Lu, Helen J. Wang, Shuang Y...
DATESO
2010
96views Database» more  DATESO 2010»
13 years 8 months ago
A Framework for Efficient Design, Maintaining, and Evolution of a System of XML Applications
Abstract. The today's applications usually form a system of sub-applications, each being responsible for a particular functionality. Hence, the design and maintenance of such ...
Martin Necaský, Irena Mlýnková...
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
13 years 8 months ago
Probabilistic Inference Protection on Anonymized Data
Background knowledge is an important factor in privacy preserving data publishing. Probabilistic distributionbased background knowledge is a powerful kind of background knowledge w...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Y...
ICIP
2010
IEEE
13 years 8 months ago
Non-rigid image registration by using graph-cuts with mutual information
Non-rigid image registration plays an important role in medical image analysis. Recently, Tang and Chung proposed to model the non-rigid medical image registration problem as an e...
Ronald W. K. So, Albert C. S. Chung
ICWS
2010
IEEE
13 years 8 months ago
An Approach for Mining Web Service Composition Patterns from Execution Logs
A service-oriented application is composed of multiple web services to fulfill complex functionality that cannot be provided by individual web service. The combination of services ...
Ran Tang, Ying Zou
« Prev « First page 1902 / 2122 Last » Next »