Sciweavers

2663 search results - page 488 / 533
» How to Choose a Timing Model
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 3 months ago
An Empirical Study on Content Bundling in BitTorrent Swarming System
Despite the tremendous success of BitTorrent, its swarming system suffers from a fundamental limitation: lower or no availability of unpopular contents. Recently, Menasche et al. ...
Jinyoung Han, Taejoong Chung, Seungbae Kim, Hyunch...
PC
2010
190views Management» more  PC 2010»
15 years 1 months ago
High-performance cone beam reconstruction using CUDA compatible GPUs
Compute unified device architecture (CUDA) is a software development platform that allows us to run C-like programs on the nVIDIA graphics processing unit (GPU). This paper prese...
Yusuke Okitsu, Fumihiko Ino, Kenichi Hagihara
125
Voted
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 1 months ago
Stochastic Budget Optimization in Internet Advertising
Internet advertising is a sophisticated game in which the many advertisers "play" to optimize their return on investment. There are many "targets" for the adve...
Bhaskar DasGupta, S. Muthukrishnan
CONSTRAINTS
2011
14 years 10 months ago
Solving Steel Mill Slab Problems with constraint-based techniques: CP, LNS, and CBLS
The Steel Mill Slab Problem is an optimization benchmark that has been studied for a long time in the constraint-programming community but was only solved efficiently in the two l...
Pierre Schaus, Pascal Van Hentenryck, Jean-Noë...
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
16 years 3 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger