Sciweavers

336 search results - page 65 / 68
» Analytic Cut Trees
Sort
View
ICDE
2010
IEEE
177views Database» more  ICDE 2010»
14 years 2 months ago
Optimal load shedding with aggregates and mining queries
— To cope with bursty arrivals of high-volume data, a DSMS has to shed load while minimizing the degradation of Quality of Service (QoS). In this paper, we show that this problem...
Barzan Mozafari, Carlo Zaniolo
KDD
2009
ACM
200views Data Mining» more  KDD 2009»
14 years 2 months ago
Visual analysis of documents with semantic graphs
In this paper, we present a technique for visual analysis of documents based on the semantic representation of text in the form of a directed graph, referred to as semantic graph....
Delia Rusu, Blaz Fortuna, Dunja Mladenic, Marko Gr...
INFOCOM
2008
IEEE
14 years 1 months ago
Reliability Gain of Network Coding in Lossy Wireless Networks
The capacity gain of network coding has been extensively studied in wired and wireless networks. Recently, it has been shown that network coding improves network reliability by re...
Majid Ghaderi, Donald F. Towsley, James F. Kurose
INFOCOM
2008
IEEE
14 years 1 months ago
Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming
—This paper presents a systematic in-depth study on the existence, importance, and application of stable nodes in peerto-peer live video streaming. Using traces from a real large...
Feng Wang, Jiangchuan Liu, Yongqiang Xiong
IWCMC
2006
ACM
14 years 1 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras