Sciweavers

736 search results - page 126 / 148
» Confidence-Aware Join Algorithms
Sort
View
PODS
2005
ACM
128views Database» more  PODS 2005»
14 years 10 months ago
Operator placement for in-network stream query processing
In sensor networks, data acquisition frequently takes place at lowcapability devices. The acquired data is then transmitted through a hierarchy of nodes having progressively incre...
Utkarsh Srivastava, Kamesh Munagala, Jennifer Wido...
AOSD
2010
ACM
14 years 4 months ago
Disambiguating aspect-oriented security policies
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Micah Jones, Kevin W. Hamlen
WAW
2009
Springer
147views Algorithms» more  WAW 2009»
14 years 4 months ago
A Dynamic Model for On-Line Social Networks
We present a deterministic model for on-line social networks based on transitivity and local knowledge in social interactions. In the Iterated Local Transitivity (ILT) model, at ea...
Anthony Bonato, Noor Hadi, Paul Horn, Pawel Pralat...
WDAG
2009
Springer
154views Algorithms» more  WDAG 2009»
14 years 4 months ago
Compact Multicast Routing
In a distributed network, a compact multicast scheme is a routing scheme that allows any source to send messages to any set of targets. We study the trade-off between the space us...
Ittai Abraham, Dahlia Malkhi, David Ratajczak
ASIAN
2007
Springer
118views Algorithms» more  ASIAN 2007»
14 years 4 months ago
Digital Rights Management Using a Master Control Device
This paper focuses on the problem of preventing the illegal copying of digital content whilst allowing content mobility within a single user domain. This paper proposes a novel sol...
Imad M. Abbadi