Sciweavers

1805 search results - page 248 / 361
» A Theory of Closure Operators
Sort
View
CORR
2011
Springer
162views Education» more  CORR 2011»
14 years 8 months ago
Optimal Power Cost Management Using Stored Energy in Data Centers
Since the electricity bill of a data center constitutes a significant portion of its overall operational costs, reducing this has become important. We investigate cost reduction o...
Rahul Urgaonkar, Bhuvan Urgaonkar, Michael J. Neel...
SIGCOMM
2012
ACM
13 years 7 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...
SIGCOMM
2012
ACM
13 years 7 months ago
Route shepherd: stability hints for the control plane
The Route Shepherd tool demonstrates applications of choosing between routing protocol configurations on the basis of rigorouslysupported theory. Splitting the configuration spa...
Alexander J. T. Gurney, Xianglong Han, Yang Li, Bo...
CL
2012
Springer
13 years 7 months ago
Maintaining distributed logic programs incrementally
Distributed logic programming languages, that allow both facts and programs to be distributed among different nodes in a network, have been recently proposed and used to declarati...
Vivek Nigam, Limin Jia, Boon Thau Loo, Andre Scedr...
STOC
2005
ACM
184views Algorithms» more  STOC 2005»
15 years 10 months ago
Coresets in dynamic geometric data streams
A dynamic geometric data stream consists of a sequence of m insert/delete operations of points from the discrete space {1, . . . , ∆}d [26]. We develop streaming (1 + )-approxim...
Gereon Frahling, Christian Sohler