Sciweavers

7274 search results - page 1332 / 1455
» Abstractions for network update
Sort
View
121
Voted
SIGCOMM
1997
ACM
15 years 8 months ago
A Flow-Based Approach to Datagram Security
Datagram services provide a simple, exible, robust, and communication abstraction; their usefulness has been well demonstrated by the success of IP, UDP, and RPC. Yet, the overwh...
Suvo Mittra, Thomas Y. C. Woo
153
Voted
ECML
1997
Springer
15 years 8 months ago
Parallel and Distributed Search for Structure in Multivariate Time Series
Abstract. E cient data mining algorithms are crucial fore ective knowledge discovery. We present the Multi-Stream Dependency Detection (msdd) data mining algorithm that performs a ...
Tim Oates, Matthew D. Schmill, Paul R. Cohen
115
Voted
ECHT
1994
15 years 7 months ago
An Interaction Engine for Rich Hypertexts
In semantically rich hypertexts it is attractive to enable presentation of a network of nodes and links at different levels action. It is also important that the user can interact...
Kasper Østerbye, Kurt Nørmark
ICS
1994
Tsinghua U.
15 years 7 months ago
Fault-tolerant wormhole routing in tori
Abstract. We present a method to enhance wormhole routing algorithms for deadlock-free fault-tolerant routing in tori. We consider arbitrarily-located faulty blocks and assume only...
Suresh Chalasani, Rajendra V. Boppana
130
Voted
VLDB
1994
ACM
115views Database» more  VLDB 1994»
15 years 7 months ago
Database Graph Views: A Practical Model to Manage Persistent Graphs
Advanced technical applications like routing systems or electrical network managementsystems introduce the need for complex manipulations of large size graphs. Efficiently support...
Alejandro Gutiérrez, Philippe Pucheral, Her...
« Prev « First page 1332 / 1455 Last » Next »