Sciweavers

627 search results - page 115 / 126
» Dual-Buffering Strategies in Object Bases
Sort
View
MAGS
2008
104views more  MAGS 2008»
13 years 9 months ago
Retractable contract network for empowerment in workforce scheduling
This paper is about business modelling and negotiation protocol design in distributed scheduling, where individual agents have individual (potentially conflicting) interests. It i...
Edward P. K. Tsang, Timothy Gosling, Botond Virgin...
RTAS
1999
IEEE
14 years 2 months ago
MIRROR: A State-Conscious Concurrency Control Protocol for Replicated Real-Time Databases
Data replication can help database systems meet the stringent temporal constraints of current time-critical applications, especially Internet-based services. A prerequisite, howev...
Ming Xiong, Krithi Ramamritham, Jayant R. Haritsa,...
ICCVW
1999
Springer
14 years 2 months ago
A General Method for Feature Matching and Model Extraction
Abstract. Popular algorithms for feature matching and model extraction fall into two broad categories, generate-and-test and Hough transform variations. However, both methods su er...
Clark F. Olson
SIGMOD
1998
ACM
143views Database» more  SIGMOD 1998»
14 years 2 months ago
Optimal Multi-Step k-Nearest Neighbor Search
For an increasing number of modern database applications, efficient support of similarity search becomes an important task. Along with the complexity of the objects such as images...
Thomas Seidl, Hans-Peter Kriegel
MMB
1997
Springer
126views Communications» more  MMB 1997»
14 years 1 months ago
Goal-oriented Performance Control for Transaction Processing
The performance of current transaction processing systems largely depends on human experts for administration and tuning. These experts have to specify a multitude of internal con...
Erhard Rahm