Sciweavers

1456 search results - page 211 / 292
» Two Techniques to Improve Finite Model Search
Sort
View
JSAC
2006
181views more  JSAC 2006»
13 years 7 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
MIR
2005
ACM
140views Multimedia» more  MIR 2005»
14 years 1 months ago
Multiple random walk and its application in content-based image retrieval
In this paper, we propose a transductive learning method for content-based image retrieval: Multiple Random Walk (MRW). Its basic idea is to construct two generative models by mea...
Jingrui He, Hanghang Tong, Mingjing Li, Wei-Ying M...
VLDB
1991
ACM
143views Database» more  VLDB 1991»
13 years 11 months ago
Handling Data Skew in Multiprocessor Database Computers Using Partition Tuning
Shared nothing multiprocessor archit.ecture is known t.obe more scalable to support very large databases. Compared to other join strategies, a hash-ba9ed join algorithm is particu...
Kien A. Hua, Chiang Lee
IAJIT
2010
102views more  IAJIT 2010»
13 years 6 months ago
Multilayer neural network-burg combination for acoustical detection of buried objects
: A Burg technique is employed to model the long wavelength localization and imaging problem. A Burg method is used as a high resolution and stable technique. The idea of in-line h...
Mujahid Al-Azzo, Lubna Badri
SIGMOD
2007
ACM
229views Database» more  SIGMOD 2007»
14 years 8 months ago
Spark: top-k keyword query in relational databases
With the increasing amount of text data stored in relational databases, there is a demand for RDBMS to support keyword queries over text data. As a search result is often assemble...
Yi Luo, Xuemin Lin, Wei Wang 0011, Xiaofang Zhou