Sciweavers

1005 search results - page 185 / 201
» Privacy Preserving Clustering
Sort
View
126
Voted
SIGMOD
2001
ACM
121views Database» more  SIGMOD 2001»
16 years 3 months ago
XML Document Versioning
Managing multiple versions of XML documents represents an important problem, because of many applications ranging from traditional ones, such as software configuration control, to...
Shu-Yao Chien, Vassilis J. Tsotras, Carlo Zaniolo
120
Voted
FASE
2009
Springer
15 years 10 months ago
Reducing the Costs of Bounded-Exhaustive Testing
Abstract. Bounded-exhaustive testing is an automated testing methodology that checks the code under test for all inputs within given bounds: first the user describes a set of test...
Vilas Jagannath, Yun Young Lee, Brett Daniel, Dark...
IROS
2009
IEEE
120views Robotics» more  IROS 2009»
15 years 10 months ago
Concurrent tree traversals for improved mission performance under limited communication range
— In previous work we presented a multi-robot strategy for routing missions in large scenarios where network connectivity must be explicitly preserved. This strategy is founded o...
Alejandro R. Mosteo, Luis Montano
WSOM
2009
Springer
15 years 10 months ago
Analytic Comparison of Self-Organising Maps
Abstract. SOMs have proven to be a very powerful tool for data analysis. However, comparing multiple SOMs trained on the same data set using different parameters or initialisation...
Rudolf Mayer, Robert Neumayer, Doris Baum, Andreas...
116
Voted
CCGRID
2008
IEEE
15 years 10 months ago
An Autonomic Peer-to-Peer Architecture for Hosting Stateful Web Services
—In this paper we present an autonomic web services architecture that manages both the performance of service containers and the interconnection of those containers into a servic...
Christoph Reich, Kris Bubendorfer, Rajkumar Buyya