Search
Now showing items 51-60 of 106
UBCA: A Utility Based Clustering Architecture For Peer-to-peer Networks
(Computer Science & Engineering, 2007-08-23)
Use of the Peer-to-Peer (P2P) architecture has recently spread in popularity. File sharing and ad hoc networks have contributed to the architecture's usage. P2P generates new challenges in scalability, fairness, and ...
A Framework For Improving The Performance Of Application Servers In Next Generation Networks (NGNs)
(Computer Science & Engineering, 2007-09-17)
Next generation networks (NGNs) such as IP Multimedia Subsystem (IMS) are completely built on the Internet Protocol (IP) suite. This has made IP the de facto standard for data networking, voice over IP (VoIP), and media ...
A Framework For Supporting Quality Of Service Requirements In A Data Stream Management System
(Computer Science & Engineering, 2007-08-23)
Currently, a large class of data-intensive applications, in which data are presented in the form of continuous data streams rather than static relations, has been widely recognized in the database community. Not only is ...
Structure Based XML Indexing
(Computer Science & Engineering, 2007-08-23)
The increase in the usage and popularity of semi-structured data has received considerable attention, and a lot of research is going on for the efficient retrieval and storage of semi-structured data. A popular model and ...
M-infosift : A Graph-based Approach For Multiclass Document Classification
(Computer Science & Engineering, 2007-09-17)
With the increase in the amount of data being introduced into the Internet on a daily basis, the problem of managing large amount of data is an unavoidable problem. The area of document classification has been examined, ...
Hiearchical Overlay For Service Composition In Pervasive Environments
(Computer Science & Engineering, 2007-09-17)
The objective of pervasive computing is to allow users to perform their tasks in a transparent way regardless of device features. Resources on devices should be exploited to provide services in order to perform user tasks. ...
A Random Walk Approach To Sampling Hidden Databases
(Computer Science & Engineering, 2007-08-23)
A large part of the data on the World Wide Web is hidden behind form-like interfaces. These interfaces interact with a hidden back-end database to provide answers to user queries. Generating a uniform random sample of this ...
Efficient XQuery Processing Of Streamed XML Fragments
(Computer Science & Engineering, 2007-08-23)
XStreamCast is a push-based streamed XML query processing system that supports multiple servers and clients. The servers broadcast streamed XML data while the clients register to these servers for a specific service and ...
Inference Of Node And Edge Replacement Graph Grammars
(Computer Science & Engineering, 2007-08-23)
In this dissertation we study the inference of node and edge replacement graph grammars. The approach is based on previous research in frequent isomorphic subgraphs discovery. We extend the search for frequent subgraphs ...
Automating Inhabitant Interactions In Home And Workplace Environments Through Data-driven Generation Of Hierarchical Partially-observable Markov Decision Processes
(Computer Science & Engineering, 2007-08-23)
Markov models provide a useful representation of system behavioral actions and state observations, but they do not scale well. Utilizing a hierarchy and abstraction through hierarchical hidden Markov models (HHMMs) improves ...