Sciweavers

273 search results - page 27 / 55
» Electricity Markets: How Many, Where and When
Sort
View
XIMEP
2006
ACM
194views Database» more  XIMEP 2006»
14 years 1 months ago
Template Folding for XPath
We discuss query evaluation for XML-based server systems where the same query is evaluated on every incoming XML message. In a typical scenario, many of the incoming messages will...
Carl-Christian Kanne, Guido Moerkotte
CPM
2005
Springer
101views Combinatorics» more  CPM 2005»
14 years 1 months ago
Succinct Suffix Arrays Based on Run-Length Encoding
A succinct full-text self-index is a data structure built on a text T = t1t2 . . . tn, which takes little space (ideally close to that of the compressed text), permits efficient se...
Veli Mäkinen, Gonzalo Navarro
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
13 years 9 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng
AROBOTS
2002
67views more  AROBOTS 2002»
13 years 7 months ago
A System for Semi-Autonomous Tractor Operations
Tractors are the workhorses of the modern farm. By automating these machines, we can increase the productivity, improve safety, and reduce costs for many agricultural operations. ...
Anthony Stentz, Cristian Dima, Carl Wellington, He...
ICPADS
2008
IEEE
14 years 2 months ago
Integrity-Preserving Replica Coordination for Byzantine Fault Tolerant Systems
The use of good random numbers is essential to the integrity of many mission-critical systems. However, when such systems are replicated for Byzantine fault tolerance, a serious i...
Wenbing Zhao