Sciweavers

492 search results - page 80 / 99
» Encrypted Shared Data Spaces
Sort
View
SIGOPS
2010
130views more  SIGOPS 2010»
13 years 7 months ago
Storing and accessing live mashup content in the cloud
Today’s Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of repli...
Krzysztof Ostrowski, Ken Birman
CVPR
2007
IEEE
14 years 10 months ago
Capturing long-range correlations with patch models
The use of image patches to capture local correlations between pixels has been growing in popularity for use in various low-level vision tasks. There is a trade-off between using ...
Vincent Cheung, Nebojsa Jojic, Dimitris Samaras
RECOMB
2006
Springer
14 years 9 months ago
Efficient Enumeration of Phylogenetically Informative Substrings
We study the problem of enumerating substrings that are common amongst genomes that share evolutionary descent. For example, one might want to enumerate all identical (therefore co...
Stanislav Angelov, Boulos Harb, Sampath Kannan, Sa...
CCR
1999
92views more  CCR 1999»
13 years 8 months ago
YESSIR: a simple reservation mechanism for the Internet
Abstract-RSVP has been designed to support resource reservation in the Internet. However, it has two major problems: complexity and scalability. The former results in large message...
Ping Pan, Henning Schulzrinne
EDBT
2008
ACM
161views Database» more  EDBT 2008»
14 years 9 months ago
Load distribution of analytical query workloads for database cluster architectures
Enterprises may have multiple database systems spread across the organization for redundancy or for serving different applications. In such systems, query workloads can be distrib...
Thomas Phan, Wen-Syan Li