Sciweavers

2334 search results - page 382 / 467
» How are Real Grids Used
Sort
View
CP
2009
Springer
16 years 4 months ago
Confidence-Based Work Stealing in Parallel Constraint Programming
The most popular architecture for parallel search is work stealing: threads that have run out of work (nodes to be searched) steal from threads that still have work. Work stealing ...
Geoffrey Chu, Christian Schulte, Peter J. Stuckey
SIGMOD
2007
ACM
123views Database» more  SIGMOD 2007»
16 years 3 months ago
Schema advisor for hybrid relational-XML DBMS
In response to the widespread use of the XML format for document representation and message exchange, major database vendors support XML in terms of persistence, querying and inde...
Mirella Moura Moro, Lipyeow Lim, Yuan-Chi Chang
193
Voted
SIGMOD
2005
ACM
108views Database» more  SIGMOD 2005»
16 years 3 months ago
Guaranteeing Correctness and Availability in P2P Range Indices
New and emerging P2P applications require sophisticated range query capability and also have strict requirements on query correctness, system availability and item availability. W...
Prakash Linga, Adina Crainiceanu, Johannes Gehrke,...
114
Voted
ESORICS
2002
Springer
16 years 3 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann
127
Voted
SDM
2009
SIAM
176views Data Mining» more  SDM 2009»
16 years 24 days ago
Constraint-Based Subspace Clustering.
In high dimensional data, the general performance of traditional clustering algorithms decreases. This is partly because the similarity criterion used by these algorithms becomes ...
Élisa Fromont, Adriana Prado, Céline...