Sciweavers

8259 search results - page 1635 / 1652
» Self-Tuning Database Systems
Sort
View
ACISICIS
2009
IEEE
13 years 11 months ago
A Novel Approach Based on PCNNs Template for Fingerprint Image Thinning
A PCNNs-based square-and-triangle-template method for binary fingerprint image thinning is proposed. The algorithm is iterative, in which a combined sequential and parallel proces...
Dacheng Xu, Bailiang Li, Anton Nijholt
CIKM
2009
Springer
13 years 11 months ago
Provenance query evaluation: what's so special about it?
While provenance has been extensively studied in the literature, the efficient evaluation of provenance queries remains an open problem. Traditional query optimization techniques...
Anastasios Kementsietsidis, Min Wang
CCS
2008
ACM
13 years 9 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
CIKM
2008
Springer
13 years 9 months ago
SNIF TOOL: sniffing for patterns in continuous streams
Continuous time-series sequence matching, specifically, matching a numeric live stream against a set of predefined pattern sequences, is critical for domains ranging from fire spr...
Abhishek Mukherji, Elke A. Rundensteiner, David C....
CIKM
2008
Springer
13 years 9 months ago
How should users access the content of digital books?
I report briefly on some of my own work in each of these areas and elucidate some of the questions that this research has raised. Then I propose as a research agenda the developme...
Nina Wacholder
« Prev « First page 1635 / 1652 Last » Next »