Sciweavers

9683 search results - page 1820 / 1937
» Query performance prediction
Sort
View
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 8 months ago
Evolution with Drifting Targets
We consider the question of the stability of evolutionary algorithms to gradual changes, or drift, in the target concept. We define an algorithm to be resistant to drift if, for s...
Varun Kanade, Leslie G. Valiant, Jennifer Wortman ...
IJCSA
2008
237views more  IJCSA 2008»
13 years 8 months ago
Development of A SOLAP Patrimony Management Application System: Fez Medina as a Case Study
It is well known that transactional and analytical systems each require different database architecture. In general, the database structure of transactional systems is optimized f...
I. Salam, M. El Mohajir, A. Taleb, B. El Mohajir
BMCBI
2007
174views more  BMCBI 2007»
13 years 8 months ago
ESTuber db: an online database for Tuber borchii EST sequences
Background: The ESTuber database (http://www.itb.cnr.it/estuber) includes 3,271 Tuber borchii expressed sequence tags (EST). The dataset consists of 2,389 sequences from an in-hou...
Barbara Lazzari, Andrea Caprera, Cristian Cosentin...
JSW
2008
196views more  JSW 2008»
13 years 8 months ago
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih
JUCS
2008
156views more  JUCS 2008»
13 years 8 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
« Prev « First page 1820 / 1937 Last » Next »