Sciweavers

6624 search results - page 1225 / 1325
» Design Pattern Recognition
Sort
View
JODL
2000
201views more  JODL 2000»
15 years 2 months ago
A transaction log analysis of a digital library
As experimental digital library testbeds gain wider acceptance and develop significant user bases, it becomes important to investigate the ways in which users interact with the sy...
Steve Jones, Sally Jo Cunningham, Rodger J. McNab,...
JIIS
2002
119views more  JIIS 2002»
15 years 2 months ago
Spatio-Temporal Data Mining for Typhoon Image Collection
Our research aims at discovering useful knowledge from the large collection of satellite images of typhoons using data mining approaches. We first introduce the creation of the typ...
Asanobu Kitamoto
96
Voted
TKDE
1998
102views more  TKDE 1998»
15 years 2 months ago
Fast and Effective Retrieval of Medical Tumor Shapes
—We investigate the problem of retrieving similar shapes from a large database; in particular, we focus on medical tumor shapes (“Find tumors that are similar to a given patter...
Flip Korn, Nikolaos Sidiropoulos, Christos Falouts...
TPDS
1998
71views more  TPDS 1998»
15 years 2 months ago
Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability
—Rollback-Dependency Trackability (RDT) is a property that states that all rollback dependencies between local checkpoints are on-line trackable by using a transitive dependency ...
Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang
104
Voted
COR
2008
129views more  COR 2008»
15 years 2 months ago
Queues in DOCSIS cable modem networks
In this paper we determine the optimal fraction c of the uplink channel capacity that should be dedicated to the contention channel in a DOCSIS cable network in order to minimize ...
Joke Lambert, Benny Van Houdt, Chris Blondia
« Prev « First page 1225 / 1325 Last » Next »