Sciweavers

1533 search results - page 231 / 307
» Ordering the attributes of query results
Sort
View
PVLDB
2008
134views more  PVLDB 2008»
13 years 9 months ago
Evita raced: metacompilation for declarative networks
Declarative languages have recently been proposed for many new applications outside of traditional data management. Since these are relatively early research efforts, it is import...
Tyson Condie, David Chu, Joseph M. Hellerstein, Pe...
SISAP
2010
IEEE
243views Data Mining» more  SISAP 2010»
13 years 7 months ago
Similarity matrix compression for efficient signature quadratic form distance computation
Determining similarities among multimedia objects is a fundamental task in many content-based retrieval, analysis, mining, and exploration applications. Among state-of-the-art sim...
Christian Beecks, Merih Seran Uysal, Thomas Seidl
MDM
2009
Springer
299views Communications» more  MDM 2009»
14 years 4 months ago
Aggregate Location Monitoring for Wireless Sensor Networks: A Histogram-Based Approach
Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitori...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
CIKM
2011
Springer
12 years 10 months ago
Factorization-based lossless compression of inverted indices
Many large-scale Web applications that require ranked top-k retrieval are implemented using inverted indices. An inverted index represents a sparse term-document matrix, where non...
George Beskales, Marcus Fontoura, Maxim Gurevich, ...
VSTTE
2012
Springer
12 years 5 months ago
Infeasible Code Detection
A piece of code in a computer program is infeasible if it cannot be part of any normally-terminating execution of the program. We develop an algorithm for the automatic detection o...
Cristiano Bertolini, Martin Schäf, Pascal Sch...