Sciweavers

377 search results - page 45 / 76
» Linear Tabling Strategies and Optimizations
Sort
View
ICMCS
2006
IEEE
153views Multimedia» more  ICMCS 2006»
14 years 1 months ago
RESP: Shortest-Path-Based Cache Replacement in a Transcoding Proxy
In this paper, we discuss the cache replacement policy in a multimedia transcoding proxy. Unlike the cache replacement for conventional web objects, to replace some elements with ...
Hao-Ping Hung, Ming-Syan Chen
ICPADS
2006
IEEE
14 years 1 months ago
OBN: Peering for Finding Suppliers in P2P On-demand Streaming Systems
A critical issue in peer-to-peer (P2P) streaming systems is to find a peer that can provide required streaming data (eligibility determination) with good quality (quality optimiza...
Chi-Shiang Liao, Wen-Hung Sun, Chung-Ta King, Hung...
ICS
2000
Tsinghua U.
13 years 11 months ago
Improving parallel system performance by changing the arrangement of the network links
The Midimew network is an excellent contender for implementing the communication subsystem of a high performance computer. This network is an optimal 2D topology in the sense ther...
Valentin Puente, Cruz Izu, José A. Gregorio...
TCS
2008
13 years 7 months ago
The Magnus-Derek game
We introduce a new combinatorial game between two players: Magnus and Derek. Initially, a token is placed at position 0 on a round table with n positions. In each round of the gam...
Zhivko Prodanov Nedev, S. Muthukrishnan
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
14 years 7 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan