Sciweavers

172 search results - page 9 / 35
» tkde 2008
Sort
View
TKDE
2002
104views more  TKDE 2002»
13 years 9 months ago
The Presumed-Either Two-Phase Commit Protocol
This paper describes the presumed-either two-phase commit protocol. Presumed-either exploits log piggybacking to reduce the cost of committing transactions. If timely piggybacking ...
Gopi K. Attaluri, Kenneth Salem
TKDE
2008
107views more  TKDE 2008»
13 years 9 months ago
Computation and Monitoring of Exclusive Closest Pairs
Given two datasets A and B, their exclusive closest pairs (ECP) join is a one-to-one assignment of objects from the two datasets, such that (i) the closest pair (a, b) in A
Leong Hou U, Nikos Mamoulis, Man Lung Yiu
TKDE
2008
152views more  TKDE 2008»
13 years 9 months ago
SRDA: An Efficient Algorithm for Large-Scale Discriminant Analysis
Linear Discriminant Analysis (LDA) has been a popular method for extracting features that preserves class separability. The projection functions of LDA are commonly obtained by max...
Deng Cai, Xiaofei He, Jiawei Han
TKDE
2008
139views more  TKDE 2008»
13 years 9 months ago
Mining Weighted Association Rules without Preassigned Weights
Association rule mining is a key issue in data mining. However, the classical models ignore the difference between the transactions, and the weighted association rule mining does n...
Ke Sun, Fengshan Bai
TKDE
2008
96views more  TKDE 2008»
13 years 9 months ago
A Scrambling Method for Fingerprint Positioning Based on Temporal Diversity and Spatial Dependency
Signal strength fluctuation is one of the major problems in a fingerprint-based localization system. To alleviate this problem, we propose a scrambling method to exploit temporal d...
Sheng-Po Kuo, Yu-Chee Tseng