Sciweavers

976 search results - page 52 / 196
» Evaluating Adversarial Partitions
Sort
View
ICDE
2010
IEEE
249views Database» more  ICDE 2010»
14 years 4 months ago
PARINET: A tunable access method for in-network trajectories
— In this paper we propose PARINET, a new access method to efficiently retrieve the trajectories of objects moving in networks. The structure of PARINET is based on a combination...
Iulian Sandu Popa, Karine Zeitouni, Vincent Oria, ...
CIT
2007
Springer
14 years 4 months ago
Performance Assessment of Some Clustering Algorithms Based on a Fuzzy Granulation-Degranulation Criterion
In this paper a fuzzy quantization dequantization criterion is used to propose an evaluation technique to determine the appropriate clustering algorithm suitable for a particular ...
Sriparna Saha, Sanghamitra Bandyopadhyay
WADS
2005
Springer
149views Algorithms» more  WADS 2005»
14 years 3 months ago
Balanced Aspect Ratio Trees Revisited
Spatial databases support a variety of geometric queries on point data such as range searches, nearest neighbor searches, etc. Balanced Aspect Ratio (BAR) trees are hierarchical sp...
Amitabh Chaudhary, Michael T. Goodrich
SIGMOD
1999
ACM
125views Database» more  SIGMOD 1999»
14 years 2 months ago
Selectivity Estimation in Spatial Databases
Selectivity estimation of queries is an important and wellstudied problem in relational database systems. In this paper, we examine selectivity estimation in the context of Geogra...
Swarup Acharya, Viswanath Poosala, Sridhar Ramaswa...
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
14 years 10 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...