Sciweavers

1358 search results - page 111 / 272
» Diverse Firewall Design
Sort
View
163
Voted
ICDM
2010
IEEE
217views Data Mining» more  ICDM 2010»
15 years 2 months ago
iSAX 2.0: Indexing and Mining One Billion Time Series
There is an increasingly pressing need, by several applications in diverse domains, for developing techniques able to index and mine very large collections of time series. Examples...
Alessandro Camerra, Themis Palpanas, Jin Shieh, Ea...
160
Voted
EMO
2009
Springer
143views Optimization» more  EMO 2009»
15 years 2 months ago
Adapting to the Habitat: On the Integration of Local Search into the Predator-Prey Model
Traditionally, Predator-Prey Models--although providing a more nature-oriented approach to multi-objective optimization than many other standard Evolutionary Multi-Objective Algori...
Christian Grimme, Joachim Lepping, Alexander Papas...
GLOBECOM
2009
IEEE
15 years 2 months ago
Cooperative Uplink of Two Mobile Stations with Network Coding Based on the WiMax LDPC Code
We consider the uplink of two mobile stations with the help of one common relay. Recently, joint network-channel coding based on LDPC codes was proposed for this setup where the ch...
Lena Chebli, Christoph Hausl, Georg Zeitler, Ralf ...
164
Voted
CSCW
2011
ACM
14 years 11 months ago
Research team integration: what it is and why it matters
Science policy across the world emphasizes the desirability of research teams that can integrate diverse perspectives and expertise into new knowledge, methods, and products. Howe...
Aruna D. Balakrishnan, Sara B. Kiesler, Jonathon N...
141
Voted
ICDE
2011
IEEE
222views Database» more  ICDE 2011»
14 years 8 months ago
Dynamic prioritization of database queries
— Enterprise database systems handle a variety of diverse query workloads that are of different importance to the business. For example, periodic reporting queries are usually mi...
Sivaramakrishnan Narayanan, Florian Waas