Sciweavers

2912 search results - page 334 / 583
» Logistic Model Trees
Sort
View
ICDE
1998
IEEE
147views Database» more  ICDE 1998»
16 years 6 months ago
The Effect of Buffering on the Performance of R-Trees
?Past R-tree studies have focused on the number of nodes visited as a metric of query performance. Since database systems usually include a buffering mechanism, we propose that the...
Scott T. Leutenegger, Mario A. Lopez
146
Voted
DCOSS
2005
Springer
15 years 10 months ago
Routing Explicit Side Information for Data Compression in Wireless Sensor Networks
Abstract. Two difficulties in designing data-centric routes [2–5] in wireless sensor networks are the lack of reasonably practical data aggregation models and the high computatio...
Huiyu Luo, Gregory J. Pottie
132
Voted
EUROCRYPT
2003
Springer
15 years 9 months ago
A Forward-Secure Public-Key Encryption Scheme
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious concern. Forward security allows one to mitigate the...
Ran Canetti, Shai Halevi, Jonathan Katz
JSS
2008
91views more  JSS 2008»
15 years 4 months ago
Software architecture reliability analysis using failure scenarios
We propose an approach for analyzing software architectures with respect to reliability to improve fault tolerance. The approach defines a failure scenario model that is based on ...
Bedir Tekinerdogan, Hasan Sözer, Mehmet Aksit
111
Voted
CORR
1998
Springer
113views Education» more  CORR 1998»
15 years 4 months ago
Letter to Sound Rules for Accented Lexicon Compression
This paper presents trainable methods for generating letter to sound rules from a given lexicon for use in pronouncing out-ofvocabulary words and as a method for lexicon compressi...
V. Pagel, Kevin Lenzo, Alan W. Black