Sciweavers

14642 search results - page 2920 / 2929
» It's Time for a Change
Sort
View
SIGMETRICS
2011
ACM
140views Hardware» more  SIGMETRICS 2011»
13 years 13 days ago
On the stability and optimality of universal swarms
Recent work on BitTorrent swarms has demonstrated that a bandwidth bottleneck at the seed can lead to the underutilization of the aggregate swarm capacity. Bandwidth underutilizat...
Xia Zhou, Stratis Ioannidis, Laurent Massouli&eacu...
SIGMOD
2011
ACM
176views Database» more  SIGMOD 2011»
13 years 13 days ago
Sharing work in keyword search over databases
An important means of allowing non-expert end-users to pose ad hoc queries — whether over single databases or data integration systems — is through keyword search. Given a set...
Marie Jacob, Zachary G. Ives
ATAL
2011
Springer
12 years 9 months ago
Commitments with regulations: reasoning about safety and control in REGULA
Commitments provide a flexible means for specifying the business relationships among autonomous and heterogeneous agents, and lead to a natural way of enacting such relationships...
Elisa Marengo, Matteo Baldoni, Cristina Baroglio, ...
CIKM
2011
Springer
12 years 9 months ago
Do all birds tweet the same?: characterizing twitter around the world
Social media services have spread throughout the world in just a few years. They have become not only a new source of information, but also new mechanisms for societies world-wide...
Barbara Poblete, Ruth Garcia, Marcelo Mendoza, Ale...
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
« Prev « First page 2920 / 2929 Last » Next »