Sciweavers

999 search results - page 173 / 200
» Warping the time on data streams
Sort
View
EDBT
2009
ACM
119views Database» more  EDBT 2009»
13 years 11 months ago
Unrestricted wavelet synopses under maximum error bound
Constructing Haar wavelet synopses under a given approximation error has many real world applications. In this paper, we take a novel approach towards constructing unrestricted Ha...
Chaoyi Pang, Qing Zhang, David P. Hansen, Anthony ...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 7 months ago
On Finding Frequent Patterns in Event Sequences
Given a directed acyclic graph with labeled vertices, we consider the problem of finding the most common label sequences ("traces") among all paths in the graph (of some...
Andrea Campagna, Rasmus Pagh
IJSNET
2008
113views more  IJSNET 2008»
13 years 7 months ago
Reservation-based protocol for monitoring applications using IEEE 802.15.4 sensor networks
: The IEEE 802.15.4 and Zigbee are protocols aimed at low-duty and low-power wireless sensor networks. Continuously monitoring applications such as applications of structural healt...
Vidya Krishnamurthy, Edward Sazonov
OSN
2008
83views more  OSN 2008»
13 years 7 months ago
Path selection in user-controlled circuit-switched optical networks
User-controlled circuit-switched optical networks are gaining popularity in an effort to fulfill the insatiable data transport needs of the online community. In this paper we cons...
Wojciech M. Golab, Raouf Boutaba
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 15 days ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...