Sciweavers

510 search results - page 76 / 102
» Performance Improvement Methods for NETCONF-Based Configurat...
Sort
View
IWCMC
2010
ACM
14 years 24 days ago
Dividing sensitive ranges based mobility prediction algorithm in wireless networks
As wireless networks have been widely deployed for public mobile services, predicting the location of a mobile user in wireless networks became an interesting and challenging prob...
Yuliang Tang, Der-Jiunn Deng, Yannan Yuan, Chun-Ch...
COOPIS
1998
IEEE
14 years 6 hour ago
Towards an Inductive Design of Distributed Object Oriented Databases
Cooperative Information Systems (CIS) often consist of applications that access shared resources such as databases. Since centralized systems may have a great impact on the system...
Fernanda Araujo Baião, Marta Mattoso, Gerso...
CIKM
1994
Springer
13 years 12 months ago
TID Hash Joins
TID hash joins are a simple and memory-efficient method for processing large join queries. They are based on standard hash join algorithms but only store TID/key pairs in the hash...
Robert Marek, Erhard Rahm
SIGIR
2010
ACM
13 years 11 months ago
Capturing page freshness for web search
Freshness has been increasingly realized by commercial search engines as an important criteria for measuring the quality of search results. However, most information retrieval met...
Na Dai, Brian D. Davison
CIKM
2008
Springer
13 years 9 months ago
Scaling up duplicate detection in graph data
Duplicate detection determines different representations of realworld objects in a database. Recent research has considered the use of relationships among object representations t...
Melanie Herschel, Felix Naumann