Sciweavers

736 search results - page 133 / 148
» Confidence-Aware Join Algorithms
Sort
View
PERCOM
2006
ACM
14 years 9 months ago
Performance Analysis of Stealth DHT with Mobile Nodes
The advances in wireless networking and the consequent emergence of new applications that wireless networks increasingly support inevitably leads to low capability mobile nodes co...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, La...
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 4 months ago
Finding frequent co-occurring terms in relational keyword search
Given a set Q of keywords, conventional keyword search (KS) returns a set of tuples, each of which (i) is obtained from a single relation, or by joining multiple relations, and (i...
Yufei Tao, Jeffrey Xu Yu
XSYM
2009
Springer
264views Database» more  XSYM 2009»
14 years 4 months ago
From Entity Relationship to XML Schema: A Graph-Theoretic Approach
Abstract. We propose a mapping from the Enhanced Entity Relationship conceptual model to the W3C XML Schema Language with the following properties: information and integrity constr...
Massimo Franceschet, Donatella Gubiani, Angelo Mon...
ICC
2008
IEEE
109views Communications» more  ICC 2008»
14 years 4 months ago
An MDP-Based Approach for Multipath Data Transmission over Wireless Networks
—Maintaining performance and reliability in wireless networks is a challenging task due to the nature of wireless channels. Multipath data transmission has been used in wired sce...
Vinh Bui, Weiping Zhu, Alessio Botta, Antonio Pesc...
ICC
2008
IEEE
168views Communications» more  ICC 2008»
14 years 4 months ago
A Balanced Tree-Based Strategy for Unstructured Media Distribution in P2P Networks
—Most research on P2P multimedia streaming assumes that users access video content sequentially and passively. Unlike P2P live streaming in which the peers start playback from th...
Changqiao Xu, Gabriel-Miro Muntean, Enda Fallon, A...