Sciweavers

3641 search results - page 728 / 729
» On Computability of Pattern Recognition Problems
Sort
View
FAC
2010
121views more  FAC 2010»
13 years 7 months ago
Blaming the client: on data refinement in the presence of pointers
Data refinement is a common approach to reasoning about programs, based on establishing that te program indeed satisfies all the required properties imposed by an intended abstract...
Ivana Filipovic, Peter W. O'Hearn, Noah Torp-Smith...
FOCM
2010
122views more  FOCM 2010»
13 years 7 months ago
Scattering in Flatland: Efficient Representations via Wave Atoms
This paper presents a numerical compression strategy for the boundary integral equation of acoustic scattering in two dimensions. These equations have oscillatory kernels that we ...
Laurent Demanet, Lexing Ying
CIKM
2010
Springer
13 years 4 months ago
Mining networks with shared items
Recent advances in data processing have enabled the generation of large and complex graphs. Many researchers have developed techniques to investigate informative structures within...
Jun Sese, Mio Seki, Mutsumi Fukuzaki
SIGMOD
2011
ACM
220views Database» more  SIGMOD 2011»
13 years 18 days ago
Zephyr: live migration in shared nothing databases for elastic cloud platforms
Multitenant data infrastructures for large cloud platforms hosting hundreds of thousands of applications face the challenge of serving applications characterized by small data foo...
Aaron J. Elmore, Sudipto Das, Divyakant Agrawal, A...
ACMSE
2008
ACM
13 years 11 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins