Sciweavers

3303 search results - page 88 / 661
» Multidimensional Access Methods
Sort
View
WDAS
2000
13 years 10 months ago
Scalable Distributed Data Structures: A Survey
This paper reviews literature on scalable data structures for searching in a distributed computing environment. Starting with a system where one server manages a file of a given s...
Adriano Di Pasquale, Enrico Nardelli
PAMI
2002
148views more  PAMI 2002»
13 years 8 months ago
Two Variations on Fisher's Linear Discriminant for Pattern Recognition
Discriminants are often used in pattern recognition to separate clusters of points in some multidimensional "feature" space. This paper provides two fast and simple techn...
Tristrom Cooke
ISSA
2004
13 years 10 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
EWDW
1994
14 years 1 months ago
Optimization of Object-Oriented Queries by Inverse Methods
For object-oriented databases we propose a new technique for optimizing queries containing method invocations. This technique is based on the definition of inverse methods and que...
Johann Eder, Heinz Frank, Walter Liebhart
CHI
2003
ACM
14 years 2 months ago
ShownPass: an easy access control with a displayed password
Access control is one of the most important issue with ubiquitous networking environment. Traditional access control methods are mainly considering authentication of registered us...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto