Sciweavers

7200 search results - page 1358 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
SIGMOD
2007
ACM
149views Database» more  SIGMOD 2007»
14 years 9 months ago
Mobile and embedded databases
Recent advances in device technology and connectivity have paved the way for next generation applications that are data-driven, where data can reside anywhere, can be accessed at ...
Anil Nori
SIGMOD
2003
ACM
145views Database» more  SIGMOD 2003»
14 years 9 months ago
Evaluating Probabilistic Queries over Imprecise Data
Many applications employ sensors for monitoring entities such as temperature and wind speed. A centralized database tracks these entities to enable query processing. Due to contin...
Reynold Cheng, Dmitri V. Kalashnikov, Sunil Prabha...
EDBT
2008
ACM
161views Database» more  EDBT 2008»
14 years 9 months ago
Load distribution of analytical query workloads for database cluster architectures
Enterprises may have multiple database systems spread across the organization for redundancy or for serving different applications. In such systems, query workloads can be distrib...
Thomas Phan, Wen-Syan Li
EDBT
2008
ACM
206views Database» more  EDBT 2008»
14 years 9 months ago
Designing an inductive data stream management system: the stream mill experience
There has been much recent interest in on-line data mining. Existing mining algorithms designed for stored data are either not applicable or not effective on data streams, where r...
Hetal Thakkar, Barzan Mozafari, Carlo Zaniolo
ICSE
2007
IEEE-ACM
14 years 9 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
« Prev « First page 1358 / 1440 Last » Next »