Sciweavers

898 search results - page 13 / 180
» A Linear Tabling Mechanism
Sort
View
NDSS
2006
IEEE
14 years 1 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...
ISLPED
2006
ACM
73views Hardware» more  ISLPED 2006»
14 years 1 months ago
Substituting associative load queue with simple hash tables in out-of-order microprocessors
Buffering more in-flight instructions in an out-of-order microprocessor is a straightforward and effective method to help tolerate the long latencies generally associated with ...
Alok Garg, Fernando Castro, Michael C. Huang, Dani...
EUC
2005
Springer
14 years 1 months ago
Distributed Contextual Information Storage Using Content-Centric Hash Tables
We analyze the problem of storing contextual information across a set of distributed heterogeneous mobile devices. These devices form a Mobile Ad Hoc Network (MANET) interconnected...
Ignacio Nieto-Carvajal, Juan A. Botía, Pedr...
PODS
2010
ACM
197views Database» more  PODS 2010»
13 years 7 months ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
TIFS
2008
109views more  TIFS 2008»
13 years 7 months ago
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks
Today, mass-scale electronic content distribution systems embed forensic tracking watermarks primarily at the distribution server. For limiting the bandwidth usage and server compl...
Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbe...