Sciweavers

3303 search results - page 648 / 661
» Multidimensional Access Methods
Sort
View
JAIR
2008
135views more  JAIR 2008»
13 years 10 months ago
On Similarities between Inference in Game Theory and Machine Learning
In this paper, we elucidate the equivalence between inference in game theory and machine learning. Our aim in so doing is to establish an equivalent vocabulary between the two dom...
Iead Rezek, David S. Leslie, Steven Reece, Stephen...
JNW
2008
177views more  JNW 2008»
13 years 10 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
JUCS
2008
113views more  JUCS 2008»
13 years 10 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JSAC
2006
130views more  JSAC 2006»
13 years 10 months ago
Performance Preserving Topological Downscaling of Internet-Like Networks
Abstract--The Internet is a large, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in ...
Fragkiskos Papadopoulos, Konstantinos Psounis, Ram...
SIGMOD
2008
ACM
138views Database» more  SIGMOD 2008»
13 years 10 months ago
Configuration-parametric query optimization for physical design tuning
Automated physical design tuning for database systems has recently become an active area of research and development. Existing tuning tools explore the space of feasible solutions...
Nicolas Bruno, Rimma V. Nehme