Sciweavers

15251 search results - page 2983 / 3051
» Network Science - Theory and Application
Sort
View
231
Voted
WAIM
2009
Springer
15 years 10 months ago
StreetTiVo: Using a P2P XML Database System to Manage Multimedia Data in Your Living Room
StreetTiVo is a project that aims at bringing research results into the living room; in particular, a mix of current results in the areas of Peer-to-Peer XML Database Management Sy...
Ying Zhang, Arjen P. de Vries, Peter A. Boncz, Djo...
122
Voted
COCOON
2009
Springer
15 years 10 months ago
Online Tree Node Assignment with Resource Augmentation
Given a complete binary tree of height h, the online tree node assignment problem is to serve a sequence of assignment/release requests, where an assignment request, with an integ...
Joseph Wun-Tat Chan, Francis Y. L. Chin, Hing-Fung...
121
Voted
EUROPAR
2009
Springer
15 years 10 months ago
A Case Study of Communication Optimizations on 3D Mesh Interconnects
Optimal network performance is critical to efficient parallel scaling for communication-bound applications on large machines. With wormhole routing, no-load latencies do not increa...
Abhinav Bhatele, Eric J. Bohm, Laxmikant V. Kal&ea...
144
Voted
ISAAC
2009
Springer
140views Algorithms» more  ISAAC 2009»
15 years 10 months ago
Shifting Strategy for Geometric Graphs without Geometry
We give a simple framework which is an alternative to the celebrated and widely used shifting strategy of Hochbaum and Maass [J. ACM, 1985] which has yielded efficient algorithms ...
Imran A. Pirwani
127
Voted
ISW
2009
Springer
15 years 10 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
« Prev « First page 2983 / 3051 Last » Next »