Sciweavers

1995 search results - page 66 / 399
» From Data Flow Networks to Process Algebras
Sort
View
DSOM
2003
Springer
15 years 9 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
CORR
2011
Springer
177views Education» more  CORR 2011»
14 years 7 months ago
Gossip PCA
Eigenvectors of data matrices play an important role in many computational problems, ranging from signal processing to machine learning and control. For instance, algorithms that ...
Satish Babu Korada, Andrea Montanari, Sewoong Oh
136
Voted
EDBT
2004
ACM
122views Database» more  EDBT 2004»
16 years 4 months ago
Sketch-Based Multi-query Processing over Data Streams
Abstract. Recent years have witnessed an increasing interest in designing algorithms for querying and analyzing streaming data (i.e., data that is seen only once in a fixed order) ...
Alin Dobra, Minos N. Garofalakis, Johannes Gehrke,...
174
Voted
MOBIHOC
2007
ACM
16 years 3 months ago
Capacity scaling in delay tolerant networks with heterogeneous mobile nodes
We provide a general framework for the analysis of the capacity scaling properties in mobile ad-hoc networks with heterogeneous nodes and spatial inhomogeneities. Existing analyti...
Michele Garetto, Paolo Giaccone, Emilio Leonardi
ELPUB
2006
ACM
15 years 10 months ago
NARCIS: The Gateway to Dutch Scientific Information
NARCIS, National Academic Research and Collaborations Information System, is a project in the Netherlands to build a portal for research information which combines structured rese...
Elly Dijk, Chris Baars, Arjan Hogenaar, Marga van ...