In particular, a fundamental requirement of such systems is the ability to perform multidimensional analyses in online response times. As multidimensional queries usually involve a huge amount of data to be agg
Vitter, J.S., Wang, M., Iyer, B.: Data Cube Approximation and Histograms via Wavelets. In: Proceeding of the 7th ACM International Conference on Information and Knowledge Management, pp. 96–104 (1998) Google Scholar Vitter, J.S., Wang, M.: Approximate Computation of Multidimensional Aggr...
Nevertheless, it struggles with high computation overhead and complexity. IoT devices employed in the e-healthcare sector are resource-constrained in nature. Hence, the security algorithms proposed to protect the patient’s privacy should be chosen with extreme care to support the nature of IoT ...
The pre-computation is carried out under the assumption that the upper bound of max_dis, denoted by max dis, is given. Definition 10. Let t0 be a time point in the summarized database D0. Let max dis be the upper bound of max_dis (i.e., max dis P max dis). Then sm(ui, t0...
Inefficient Recomputation during Deletion.For each deletion of object data, they need to recompute the kNN for all query points as in static solutions, which results in high time complicity and inefficiency. In our previous work [27], we proposed maintaining the RkNN table to accelerate the pro...
Cubert provides a rich suite of operators for processing data. These include: Input/Output operators: LOAD, STORE, TEE (storing data at intermediate stages of computation into a separate folder) and LOAD-CACHED (read from Hadoop's distributed cache). Transformation operators: FROM .. GENERATE (...
Lehmann, M.: Computational study of microplastic transport at the water-air interface with a memory-optimized lattice Boltzmann method. PhD thesis, (2023) Lehmann, M.: Esoteric Pull and Esoteric Push: Two Simple In-Place Streaming Schemes for the Lattice Boltzmann Method on GPUs. Computation, 10...
Nevertheless, it struggles with high computation overhead and complexity. IoT devices employed in the e-healthcare sector are resource-constrained in nature. Hence, the security algorithms proposed to protect the patient’s privacy should be chosen with extreme care to support the nature of IoT ...
The inverse mapping 3D->(u,v,r) should also exist and should not involve much computation as well. The process represents the surface in parametric coordinates as an explicit smooth function (smooth—continuous first derivatives) of phi an theta, such as R=F(phi, theta). The compression ...
The voxelizers 30, 32 may generate a voxelized form of a respective model, which may reduce computation time in manipulating depictions of objects (e.g., containers, items, etc.). The approximate size and shape of objects may be represented in voxels. A voxel may refer to a unit of 3D...