Sciweavers

1669 search results - page 214 / 334
» Efficient Data Distribution for DWS
Sort
View
COMCOM
2004
98views more  COMCOM 2004»
13 years 10 months ago
End system multicast: an architectural infrastructure and topological optimization
Although IP-multicast has been proposed and investigated for years, there are major problems inherent in the IP-multicasting technique, e.g., difficulty to scale up the system, di...
Starsky H. Y. Wong, John C. S. Lui
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 10 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
JMLR
2002
102views more  JMLR 2002»
13 years 10 months ago
Optimal Structure Identification With Greedy Search
In this paper we prove the so-called "Meek Conjecture". In particular, we show that if a DAG H is an independence map of another DAG G, then there exists a finite sequen...
David Maxwell Chickering
NGC
2002
Springer
103views Communications» more  NGC 2002»
13 years 10 months ago
An Evaluation of Topology-sensitive Subgroup Communication Mechanism in Large-scale Multicast Applications
Abundant content, data type and diverse members' interests naturally lead to preference heterogeneity within a multicast session requiring frequent communication within subgr...
Jangwon Lee, Gustavo de Veciana
TKDE
2008
154views more  TKDE 2008»
13 years 10 months ago
Watermarking Relational Databases Using Optimization-Based Techniques
Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. In th...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor