Sciweavers

3179 search results - page 455 / 636
» Applications of PCF Theory
Sort
View
SIGECOM
2005
ACM
90views ECommerce» more  SIGECOM 2005»
14 years 2 months ago
ICE: an iterative combinatorial exchange
We present the first design for a fully expressive iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding language that is concise and expressive ...
David C. Parkes, Ruggiero Cavallo, Nick Elprin, Ad...
SIGIR
2005
ACM
14 years 2 months ago
Multi-label informed latent semantic indexing
Latent semantic indexing (LSI) is a well-known unsupervised approach for dimensionality reduction in information retrieval. However if the output information (i.e. category labels...
Kai Yu, Shipeng Yu, Volker Tresp
SIGMETRICS
2005
ACM
154views Hardware» more  SIGMETRICS 2005»
14 years 2 months ago
Fair operation of multi-server and multi-queue systems
Multi-server and multi-queue architectures are common mechanisms used in a large variety of applications (call centers, Web services, computer systems). One of the major motivatio...
David Raz, Benjamin Avi-Itzhak, Hanoch Levy
SPAA
2005
ACM
14 years 2 months ago
Oblivious routing on geometric networks
We study oblivious routing in which the packet paths are constructed independently of each other. We give a simple oblivious routing algorithm for geometric networks in which the ...
Costas Busch, Malik Magdon-Ismail, Jing Xi
STORAGESS
2005
ACM
14 years 2 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo