Sciweavers

6953 search results - page 1367 / 1391
» Development Tools for Distributed Applications
Sort
View
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 4 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
COMSWARE
2006
IEEE
14 years 4 months ago
Resource management in heterogenous wireless networks with overlapping coverage
— Development in new radio technologies and increase in user demands are driving the deployment of a wide array of wireless networks, ranging from 802.11 networks in the local ar...
Bin Bin Chen, Mun Choon Chan
ICPADS
2006
IEEE
14 years 4 months ago
Oriented Overlays For Clustering Client Requests To Data-Centric Network Services
Many of the data-centric network services deployed today hold massive volumes of data at their origin websites, and access the data to dynamically generate responses to user reque...
Congchun He, Vijay Karamcheti
INFOCOM
2006
IEEE
14 years 4 months ago
How to Select a Good Alternate Path in Large Peer-to-Peer Systems?
Abstract— When multiple paths are available between communicating hosts, application quality can be improved by switching among them to always use the best one. The key to such a...
Teng Fei, Shu Tao, Lixin Gao, Roch Guérin
SMI
2006
IEEE
123views Image Analysis» more  SMI 2006»
14 years 4 months ago
Selecting Distinctive 3D Shape Descriptors for Similarity Retrieval
Databases of 3D shapes have become widespread for a variety of applications, and a key research problem is searching these databases for similar shapes. This paper introduces a me...
Philip Shilane, Thomas A. Funkhouser
« Prev « First page 1367 / 1391 Last » Next »