Sciweavers

648 search results - page 106 / 130
» Authenticated hash tables
Sort
View
ACSC
2004
IEEE
13 years 11 months ago
Code Improvements for Model Elimination Based Reasoning Systems
We have been investigating ways in which the performance of model elimination based systems can be improved and in this paper we present some of our results. Firstly, we have inve...
Richard A. Hagen, Scott D. Goodwin, Abdul Sattar
CCGRID
2004
IEEE
13 years 11 months ago
Adaptive congestion control for hotspot management in structured peer-to-peer systems
Distributed Hash Tables (DHTs) bring the promise of increased availability of data to wide-area systems, under the assumption of uniform request load. However, they don't int...
Anne-Marie Bosneag, Yong Xi, Xinjie Li, Monica Bro...
CGO
2004
IEEE
13 years 11 months ago
Targeted Path Profiling: Lower Overhead Path Profiling for Staged Dynamic Optimization Systems
In this paper, we present a technique for reducing the overhead of collecting path profiles in the context of a dynamic optimizer. The key idea to our approach, called Targeted Pa...
Rahul Joshi, Michael D. Bond, Craig B. Zilles
CNSR
2004
IEEE
218views Communications» more  CNSR 2004»
13 years 11 months ago
CSN: A Network Protocol for Serving Dynamic Queries in Large-Scale Wireless Sensor Networks
A fundamental problem that confronts future applications of sensor networks is how to efficiently locate the sensor node that stores a particular data item. It is known that distr...
Muneeb Ali, Zartash Afzal Uzmi
DEXA
2004
Springer
91views Database» more  DEXA 2004»
13 years 11 months ago
Efficient Processing of Distributed Iceberg Semi-joins
The Iceberg SemiJoin (ISJ) of two datasets R and S returns the tuples in R which join with at least k tuples of S. The ISJ operator is essential in many practical applications incl...
Mohammed Kasim Imthiyaz, Dong Xiaoan, Panos Kalnis