Sciweavers

2842 search results - page 509 / 569
» Expansion and Search in Networks
Sort
View
SIGCOMM
2004
ACM
14 years 3 months ago
Mercury: supporting scalable multi-attribute range queries
This paper presents the design of Mercury, a scalable protocol for supporting multi-attribute rangebased searches. Mercury differs from previous range-based query systems in that...
Ashwin R. Bharambe, Mukesh Agrawal, Srinivasan Ses...
CDB
2004
Springer
143views Database» more  CDB 2004»
14 years 3 months ago
Constraint Processing Techniques for Improving Join Computation: A Proof of Concept
Constraint Processing and Database techniques overlap significantly. We discuss here the application of a constraint satisfaction technique, called dynamic bundling, to databases....
Anagh Lal, Berthe Y. Choueiry
GECCO
2004
Springer
145views Optimization» more  GECCO 2004»
14 years 3 months ago
Automated Extraction of Problem Structure
Most problems studied in artificial intelligence possess some form of structure, but a precise way to define such structure is so far lacking. We investigate how the notion of pr...
Anthony Bucci, Jordan B. Pollack, Edwin D. de Jong
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 3 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
ISMIR
2004
Springer
168views Music» more  ISMIR 2004»
14 years 3 months ago
Music Information Retrieval systems: why do individuals use them and what are their needs?
: To date there has been very little research conducted on the behaviour of music information retrieval (MIR) users, in spite of the immense popularity of free music retrieval sys...
Sara Taheri-Panah, Andrew MacFarlane