Sciweavers

328 search results - page 60 / 66
» Deterministic k-set structure
Sort
View
ICNP
2006
IEEE
14 years 22 days ago
O-MAC: A Receiver Centric Power Management Protocol
— Energy efficiency is widely understood to be one of the dominant considerations for Wireless Sensor Networks. Based on historical data and technology trends, the receiver ener...
Hui Cao, Ken Parker, Anish Arora
INFOCOM
2006
IEEE
14 years 22 days ago
Adaptive Statistical Optimization Techniques for Firewall Packet Filtering
— Packet filtering plays a critical role in the performance of many network devices such as firewalls, IPSec gateways, DiffServ and QoS routers. A tremendous amount of research...
Hazem Hamed, Adel El-Atawy, Ehab Al-Shaer
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
14 years 22 days ago
Virtually Pipelined Network Memory
We introduce virtually-pipelined memory, an architectural technique that efficiently supports high-bandwidth, uniform latency memory accesses, and high-confidence throughput eve...
Banit Agrawal, Timothy Sherwood
ICDM
2005
IEEE
166views Data Mining» more  ICDM 2005»
14 years 9 days ago
An Algorithm for In-Core Frequent Itemset Mining on Streaming Data
Frequent itemset mining is a core data mining operation and has been extensively studied over the last decade. This paper takes a new approach for this problem and makes two major...
Ruoming Jin, Gagan Agrawal
STOC
2004
ACM
138views Algorithms» more  STOC 2004»
14 years 4 days ago
Know thy neighbor's neighbor: the power of lookahead in randomized P2P networks
Several peer-to-peer networks are based upon randomized graph topologies that permit efficient greedy routing, e.g., randomized hypercubes, randomized Chord, skip-graphs and const...
Gurmeet Singh Manku, Moni Naor, Udi Wieder