Sciweavers

2979 search results - page 526 / 596
» Computation and the Periodic Table
Sort
View
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
13 years 11 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
CASCON
2006
131views Education» more  CASCON 2006»
13 years 11 months ago
STAC: software tuning panels for autonomic control
One aspect of autonomic computing is the ability to identify, separate and automatically tune parameters related to performance, security, robustness and other properties of a sof...
Elizabeth Dancy, James R. Cordy
SIGCOMM
2010
ACM
13 years 10 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
BMCBI
2007
94views more  BMCBI 2007»
13 years 10 months ago
Lightweight genome viewer: portable software for browsing genomics data in its chromosomal context
Background: Lightweight genome viewer (lwgv) is a web-based tool for visualization of sequence annotations in their chromosomal context. It performs most of the functions of large...
Jeremiah J. Faith, Andrew J. Olson, Timothy S. Gar...
CN
2010
95views more  CN 2010»
13 years 10 months ago
Loop-free alternates and not-via addresses: A proper combination for IP fast reroute?
The IETF currently discusses fast reroute mechanisms for IP networks (IP FRR). IP FRR accelerates the recovery in case of network element failures and avoids micro-loops during re...
Michael Menth, Matthias Hartmann, Rüdiger Mar...