Sciweavers

798 search results - page 145 / 160
» Interval Methods: An Introduction
Sort
View
VLDB
2008
ACM
110views Database» more  VLDB 2008»
14 years 7 months ago
Enhancing histograms by tree-like bucket indices
Histograms are used to summarize the contents of relations into a number of buckets for the estimation of query result sizes. Several techniques (e.g., MaxDiff and V-Optimal) have ...
Francesco Buccafurri, Gianluca Lax, Domenico Sacc...
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
14 years 2 months ago
Discovering Flow Anomalies: A SWEET Approach
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fractio...
James M. Kang, Shashi Shekhar, Christine Wennen, P...
IRI
2008
IEEE
14 years 2 months ago
Exercise energy expenditure estimation based on acceleration data using the linear mixed model
This paper introduces a novel algorithm for estimating energy expenditure during physical activity. The estimation is based on acceleration data measured from a wrist-worn acceler...
Eija Haapalainen, Perttu Laurinen, Pekka Siirtola,...
IPPS
2006
IEEE
14 years 1 months ago
Dynamic multi phase scheduling for heterogeneous clusters
Distributed computing systems are a viable and less expensive alternative to parallel computers. However, concurrent programming methods in distributed systems have not been studi...
Florina M. Ciorba, Theodore Andronikos, Ioannis Ri...
CRYPTO
2003
Springer
137views Cryptology» more  CRYPTO 2003»
14 years 26 days ago
New Partial Key Exposure Attacks on RSA
Abstract. In 1998, Boneh, Durfee and Frankel [4] presented several attacks on RSA when an adversary knows a fraction of the secret key bits. The motivation for these so-called part...
Johannes Blömer, Alexander May