Sciweavers

2254 search results - page 435 / 451
» Computing the minimal covering set
Sort
View
EDBT
2011
ACM
209views Database» more  EDBT 2011»
13 years 1 months ago
An optimal strategy for monitoring top-k queries in streaming windows
Continuous top-k queries, which report a certain number (k) of top preferred objects from data streams, are important for a broad class of real-time applications, ranging from fi...
Di Yang, Avani Shastri, Elke A. Rundensteiner, Mat...
ICCV
2011
IEEE
12 years 10 months ago
Localized Principal Component Analysis based Curve Evolution: A Divide and Conquer Approach
We propose a novel localized principal component analysis (PCA) based curve evolution approach which evolves the segmenting curve semi-locally within various target regions (divis...
Vikram Appia, Balaji Ganapathy, Tracy Faber, Antho...
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
14 years 11 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
DAC
2006
ACM
14 years 10 months ago
High-level power management of embedded systems with application-specific energy cost functions
Most existing dynamic voltage scaling (DVS) schemes for multiple tasks assume an energy cost function (energy consumption versus execution time) that is independent of the task ch...
Youngjin Cho, Naehyuck Chang, Chaitali Chakrabarti...
WWW
2005
ACM
14 years 10 months ago
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact wit...
Mudhakar Srivatsa, Li Xiong, Ling Liu