Sciweavers

5344 search results - page 1048 / 1069
» Privacy-Preserving Set Operations
Sort
View
121
Voted
DATAMINE
2000
118views more  DATAMINE 2000»
15 years 2 months ago
Spatial Data Mining: Database Primitives, Algorithms and Efficient DBMS Support
Abstract: Spatial data mining algorithms heavily depend on the efficient processing of neighborhood relations since the neighbors of many objects have to be investigated in a singl...
Martin Ester, Alexander Frommelt, Hans-Peter Krieg...
128
Voted
JACM
2000
77views more  JACM 2000»
15 years 2 months ago
The fault span of crash failures
A crashing network protocol is an asynchronous protocol whose memory does not survive crashes. We show that a crashing network protocol that works over unreliable links can be driv...
George Varghese, Mahesh Jayaram
127
Voted
ANSOFT
1998
157views more  ANSOFT 1998»
15 years 2 months ago
Software Engineering Programmes are not Computer Science Programmes
Programmes in “Software Engineering” have become a source of contention in many universities. Computer Science departments, many of which have used that phrase to describe ind...
David Lorge Parnas
130
Voted
CN
1998
64views more  CN 1998»
15 years 2 months ago
Decentralized Network Connection Preemption Algorithms
Connection preemption provides available and reliable services to high-priority connections when a network is heavily loaded and connection request arrival patterns are unknown, o...
Mohammad Peyravian, Ajay D. Kshemkalyani
133
Voted
ALGORITHMICA
1999
141views more  ALGORITHMICA 1999»
15 years 2 months ago
Design and Implementation of a Practical Parallel Delaunay Algorithm
Abstract. This paper describes the design and implementation of a practical parallel algorithm for Delaunay triangulation that works well on general distributions. Although there h...
Guy E. Blelloch, Jonathan C. Hardwick, Gary L. Mil...
« Prev « First page 1048 / 1069 Last » Next »