نتایج جستجو برای: icde algorithm
تعداد نتایج: 754072 فیلتر نتایج به سال:
abstract according to increase in electricity consumption in one hand and power systemsreliability importance in another , fault location detection techniqueshave beenrecentlytaken to consideration. an algorithm based on collected data from both transmission line endsproposed in this thesis. in order to reducecapacitance effects of transmission line, distributed parametersof transmission line...
THIS special section covers extended versions of topranked papers of the 31st International Conference on Data Engineering that was held in Seoul, Korea, on April 1317, 2015. The ICDE 2015 conference received 645 submissions within the research track. With an acceptance rate of 13 percent—which reflects the goal of ICDE to keep the highest quality standards—84 research papers were accepted. Wit...
There is a wide diversity of choices for a consumer who needs a data store to hold the information for a cloud-hosted application. Some stores are run as services by the cloud provider, others may be deployed and administered directly by the cloud consumer in infrastructure from the cloud provider. Some stores use a document model, others are relational, or graph, or they may even offer just a ...
Global-scale data management (GSDM) empowers systems by providing higher levels of fault-tolerance, read availability, and efficiency in utilizing cloud resources. This has led to the emergence of globalscale data management and event processing. However, the Wide-Area Network (WAN) latency separating datacenters is orders of magnitude larger than typical network latencies, and this requires a ...
due to the limiting workspace of parallel manipulator and regarding to finding the trajectory planning of singularity free at workspace is difficult, so finding a best solution that can develop a technique to determine the singularity-free zones in the workspace of parallel manipulators is highly important. in this thesis a simple and new technique are presented to determine the maximal singula...
System logs are almost the only data that records system operation information, so they play an important role in anomaly analysis, intrusion detection, and situational awareness. However, it is still a challenge to obtain effective from massive logs. On one hand, unstructured data, and, on other log cannot be directly analyzed calculated by computers. In order deal with these problems, current...
IT is my great honor to take the role of Editor-in-Chief of IEEE Transactions on Knowledge and Data Engineering (TKDE) to work for readers and authors. I want to take this opportunity to thank Professor Jian Pei, the outgoing editor-in-chief, and all past editors-in-chief for their outstanding vision, service, and leadership. These, together with their relentless commitment, has helped establis...
there are many approaches for solving variety combinatorial optimization problems (np-compelete) that devided to exact solutions and approximate solutions. exact methods can only be used for very small size instances due to their expontional search space. for real-world problems, we have to employ approximate methods such as evolutionary algorithms (eas) that find a near-optimal solution in a r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید