Sciweavers

4536 search results - page 779 / 908
» Contention-Sensitive Data Structures and Algorithms
Sort
View
INFOCOM
2003
IEEE
14 years 3 months ago
Energy Efficient Routing in Ad Hoc Disaster Recovery Networks
—The terrorist attacks on September 11, 2001 have drawn attention to the use of wireless technology in order to locate survivors of structural collapse. We propose to construct a...
Gil Zussman, Adrian Segall
SC
2003
ACM
14 years 3 months ago
Traffic-based Load Balance for Scalable Network Emulation
Load balance is critical to achieving scalability for large network emulation studies, which are of compelling interest for emerging Grid, Peer to Peer, and other distributed appl...
Xin Liu, Andrew A. Chien
SIGIR
2003
ACM
14 years 3 months ago
Implicit link analysis for small web search
Current Web search engines generally impose link analysis-based re-ranking on web-page retrieval. However, the same techniques, when applied directly to small web search such as i...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...
ERSHOV
2003
Springer
14 years 3 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
ICDT
2010
ACM
149views Database» more  ICDT 2010»
14 years 3 months ago
Mapping Polymorphism
We examine schema mappings from a type-theoretic perspective and aim to facilitate and formalize the reuse of mappings. Starting with the mapping language of Clio, we present a ty...
Ryan Wisnesky, Mauricio Hernandez, Lucian Popa