Sciweavers

4805 search results - page 102 / 961
» On the Analysis of Indexing Schemes
Sort
View
PKDD
2005
Springer
159views Data Mining» more  PKDD 2005»
14 years 1 months ago
Fast Burst Correlation of Financial Data
We examine the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. Our methodology is comprised of two steps: a burst dete...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
ICISC
2003
89views Cryptology» more  ICISC 2003»
13 years 9 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
CORR
2010
Springer
113views Education» more  CORR 2010»
13 years 8 months ago
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wireless Access Systems
This paper proposes a fair and efficient QoS scheduling scheme for IEEE 802.16 BWA systems that satisfies both throughput and delay guarantee to various real and non-real time app...
Prasun Chowdhury, Iti Saha Misra
LCN
2006
IEEE
14 years 2 months ago
Merit of PHY-MAC Cross-Layer Carrier Sensing: A MAC-Address-based Physical Carrier Sensing Scheme for Solving Hidden-Node and Ex
This paper examines how various carrier-sensing schemes affect the exposed-node (EN) and hidden-node (HN) phenomena. In the process, we identify a new carrier-sensing mechanism fo...
An Chan, Soung Chang Liew
DASFAA
2009
IEEE
146views Database» more  DASFAA 2009»
14 years 3 months ago
In-Page Logging B-Tree for Flash Memory
We demonstrate the IPL B+ -tree prototype, which has been designed as a flash-aware index structure by adopting the in-page logging (IPL) scheme. The IPL scheme has been proposed ...
Gap-Joo Na, Bongki Moon, Sang-Won Lee