Sciweavers

1487 search results - page 260 / 298
» Two Kinds of Metonymy
Sort
View
DASFAA
2006
IEEE
136views Database» more  DASFAA 2006»
14 years 1 months ago
Reuse or Never Reuse the Deleted Labels in XML Query Processing Based on Labeling Schemes
To facilitate the XML query processing, several kinds of labeling schemes have been proposed. Based on the labeling schemes, the ancestordescendant and parent-child relationships i...
Changqing Li, Tok Wang Ling, Min Hu
ICRA
2006
IEEE
90views Robotics» more  ICRA 2006»
14 years 1 months ago
A Performance Comparison of Three Algorithms for Proximity Queries Relative to Convex Polyhedra
— This paper presents a comparative analysis relative to the experimental performances of an asymptotically fast and incremental algorithm, recently developed to compute collisio...
Stefano Carpin, Claudio Mirolo, Enrico Pagello
IJCNN
2006
IEEE
14 years 1 months ago
Tentacled Self-Organizing Map for Effective Data Extraction
— Since we can accumulate a huge amount of data including useless information in these years, it is important to investigate various extraction method of clusters from data inclu...
Haruna Matsushita, Yoshifumi Nishio
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
14 years 1 months ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
MOBICOM
2006
ACM
14 years 1 months ago
On the complexity of scheduling in wireless networks
We consider the problem of throughput-optimal scheduling in wireless networks subject to interference constraints. We model the interference using a family of K-hop interference m...
Gaurav Sharma, Ravi R. Mazumdar, Ness B. Shroff