Sciweavers

1368 search results - page 215 / 274
» The Implicit Pipeline Method
Sort
View
WIOPT
2006
IEEE
14 years 5 months ago
Reverse engineering MAC
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Ao Tang, Jang-Won Lee, Jianwei Huang, Mung Chiang,...
ML
2006
ACM
14 years 4 months ago
Seminal: searching for ML type-error messages
We present a new way to generate type-error messages in a polymorphic, implicitly, and strongly typed language (specifically Caml). Our method separates error-message generation ...
Benjamin S. Lerner, Dan Grossman, Craig Chambers
ICDM
2005
IEEE
165views Data Mining» more  ICDM 2005»
14 years 4 months ago
Orthogonal Neighborhood Preserving Projections
— Orthogonal Neighborhood Preserving Projections (ONPP) is a linear dimensionality reduction technique which attempts to preserve both the intrinsic neighborhood geometry of the ...
Effrosini Kokiopoulou, Yousef Saad
IDEAS
2005
IEEE
137views Database» more  IDEAS 2005»
14 years 4 months ago
Order-Sensitive XML Query Processing over Relational Sources: An Algebraic Approach
The XML data is order-sensitive. The order problem, that is how ordered XML documents and order-sensitive queries over it can be efficiently supported when mapped into the unorde...
Ling Wang, Song Wang, Brian Murphy, Elke A. Runden...
DBISP2P
2005
Springer
129views Database» more  DBISP2P 2005»
14 years 4 months ago
Querying a Super-Peer in a Schema-Based Super-Peer Network
We propose a novel approach for de ning and querying a super-peer within a schema-based super-peer network organized into a two-level architecture: the low level, called the peer l...
Domenico Beneventano, Sonia Bergamaschi, Francesco...