Sciweavers

664 search results - page 110 / 133
» Adaptive Selectivity Estimation Using Query Feedback
Sort
View
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
14 years 3 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
JODL
2000
76views more  JODL 2000»
13 years 8 months ago
Strategy-based interactive cluster visualization for information retrieval
Abstract. In this paper we investigate a general purpose interactive information organization system. The system organizes documents by placing them into 1-, 2-, or 3-dimensional s...
Anton Leuski, James Allan
ATAL
2010
Springer
13 years 9 months ago
Role evolution in Open Multi-Agent Systems as an information source for trust
In Open Multi-Agent Systems (OMAS), deciding with whom to interact is a particularly difficult task for an agent, as repeated interactions with the same agents are scarce, and rep...
Ramón Hermoso, Holger Billhardt, Sascha Oss...
MOBIHOC
2005
ACM
14 years 8 months ago
Efficient geographic routing in multihop wireless networks
We propose a new link metric called normalized advance (NADV) for geographic routing in multihop wireless networks. NADV selects neighbors with the optimal trade-off between proxi...
Seungjoon Lee, Bobby Bhattacharjee, Suman Banerjee
ICAC
2005
IEEE
14 years 2 months ago
Feedback-based Scheduling for Back-end Databases in Shared Dynamic Content Server Clusters
This paper introduces a self-configuring architecture for scaling the database tier of dynamic content web servers. We use a unified approach to load and fault management based ...
Gokul Soundararajan, Kaloian Manassiev, Jin Chen, ...