Sciweavers

1045 search results - page 121 / 209
» The Use of Exceptions
Sort
View
ISCI
2007
103views more  ISCI 2007»
13 years 8 months ago
Threshold-based declustering
Declustering techniques reduce query response time through parallel I/O by distributing data among multiple devices. Except for a few cases it is not possible to find declusterin...
Ali Saman Tosun
CGF
2000
155views more  CGF 2000»
13 years 8 months ago
Surface Reconstruction Based on Lower Dimensional Localized Delaunay Triangulation
We present a fast, memory efficient algorithm that generates a manifold triangular mesh S passing through a set of unorganized points P R3 . Nothing is assumed about the geometry,...
M. Gopi, Shankar Krishnan, Cláudio T. Silva
IEE
2002
92views more  IEE 2002»
13 years 8 months ago
Comparison of Web size measures for predicting Web design and authoring effort
: Software practitioners recognise the importance of realistic estimates of effort for the successful management of software projects, the Web being no exception. Estimates are nec...
Emilia Mendes, Nile Mosley, Steve Counsell
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 7 months ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...
TPDS
2008
183views more  TPDS 2008»
13 years 7 months ago
Avoiding Energy Holes in Wireless Sensor Networks with Nonuniform Node Distribution
In this paper, we investigate the theoretical aspects of the nonuniform node distribution strategy used to mitigate the energy hole problem in wireless sensor networks (WSNs). We c...
Xiaobing Wu, Guihai Chen, Sajal K. Das