Sciweavers

838 search results - page 100 / 168
» Modeling skew in data streams
Sort
View
EDBT
2009
ACM
186views Database» more  EDBT 2009»
14 years 4 months ago
Automating the loading of business process data warehouses
Business processes drive the operations of an enterprise. In the past, the focus was primarily on business process design, modeling, and automation. Recently, enterprises have rea...
Malú Castellanos, Alkis Simitsis, Kevin Wil...
ASPDAC
2009
ACM
212views Hardware» more  ASPDAC 2009»
14 years 4 months ago
Timing analysis and optimization implications of bimodal CD distribution in double patterning lithography
Abstract— Double patterning lithography (DPL) is in current production for memory products, and is widely viewed as inevitable for logic products at the 32nm node. DPL decomposes...
Kwangok Jeong, Andrew B. Kahng
INFOCOM
2007
IEEE
14 years 4 months ago
Finding Self-Similarities in Opportunistic People Networks
— Opportunistic network is a type of Delay Tolerant Networks (DTN) where network communication opportunities appear opportunistic. In this study, we investigate opportunistic net...
Ling-Jyh Chen, Yung-Chih Chen, Tony Sun, Paruvelli...
ACCV
2006
Springer
14 years 4 months ago
Fisheye Lenses Calibration Using Straight-Line Spherical Perspective Projection Constraint
Fisheye lenses are often used to enlarge the field of view (FOV) of a conventional camera. But the images taken with fisheye lenses have severe distortions. This paper proposes a...
Xianghua Ying, Zhanyi Hu, Hongbin Zha
ICDE
2005
IEEE
172views Database» more  ICDE 2005»
14 years 3 months ago
Monitoring K-Nearest Neighbor Queries Over Moving Objects
Many location-based applications require constant monitoring of k-nearest neighbor (k-NN) queries over moving objects within a geographic area. Existing approaches to this problem...
Xiaohui Yu, Ken Q. Pu, Nick Koudas