Sciweavers

9739 search results - page 1669 / 1948
» Object-Oriented Analysis and Design
Sort
View
PR
2010
163views more  PR 2010»
15 years 3 months ago
A comparative evaluation of interactive segmentation algorithms
In this paper we present a comparative evaluation of four popular interactive segmentation algorithms. The evaluation was carried out as a series of user-experiments, in which par...
Kevin McGuinness, Noel E. O'Connor
PVLDB
2010
150views more  PVLDB 2010»
15 years 3 months ago
DataGarage: Warehousing Massive Performance Data on Commodity Servers
Contemporary datacenters house tens of thousands of servers. The servers are closely monitored for operating conditions and utilizations by collecting their performance data (e.g....
Charles Loboz, Slawek Smyl, Suman Nath
129
Voted
PVLDB
2010
107views more  PVLDB 2010»
15 years 3 months ago
On Multi-Column Foreign Key Discovery
A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...
PVLDB
2010
86views more  PVLDB 2010»
15 years 3 months ago
Swarm: Mining Relaxed Temporal Moving Object Clusters
Recent improvements in positioning technology make massive moving object data widely available. One important analysis is to find the moving objects that travel together. Existin...
Zhenhui Li, Bolin Ding, Jiawei Han, Roland Kays
RFIDSEC
2010
15 years 3 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
« Prev « First page 1669 / 1948 Last » Next »