Sciweavers

725 search results - page 140 / 145
» heuristics 2010
Sort
View
SIGMOD
2010
ACM
208views Database» more  SIGMOD 2010»
13 years 8 months ago
An automated, yet interactive and portable DB designer
Tuning tools attempt to configure a database to achieve optimal performance for a given workload. Selecting an optimal set of physical structures is computationally hard since it ...
Ioannis Alagiannis, Debabrata Dash, Karl Schnaitte...
TCBB
2010
136views more  TCBB 2010»
13 years 8 months ago
Efficient Extraction of Protein-Protein Interactions from Full-Text Articles
—Proteins and their interactions govern virtually all cellular processes, such as regulation, signaling, metabolism, and structure. Most experimental findings pertaining to such ...
Jörg Hakenberg, Robert Leaman, Nguyen Ha Vo, ...
TIFS
2010
184views more  TIFS 2010»
13 years 8 months ago
Information-theoretically secret key generation for fading wireless channels
—The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, ...
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra S...
TKDE
2010
274views more  TKDE 2010»
13 years 8 months ago
Ranked Query Processing in Uncertain Databases
—Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to “certain” data, the ...
Xiang Lian, Lei Chen 0002
TMC
2010
179views more  TMC 2010»
13 years 8 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera