Sciweavers

2978 search results - page 62 / 596
» Operations Research
Sort
View
153
Voted
EUROSYS
2006
ACM
15 years 11 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
136
Voted
ICFP
1999
ACM
15 years 7 months ago
Programming Languages as Operating Systems (or Revenge of the Son of the Lisp Machine)
The MrEd virtual machine serves both as the implementation platform for the DrScheme programming environment, and as the underlying Scheme engine for executing expressions and pro...
Matthew Flatt, Robert Bruce Findler, Shriram Krish...
SIGMOD
2010
ACM
168views Database» more  SIGMOD 2010»
15 years 7 months ago
SimDB: a similarity-aware database system
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Ahmed M. Aly, Walid G. Aref, Per-&...
115
Voted
ICDE
2009
IEEE
138views Database» more  ICDE 2009»
15 years 12 days ago
Similarity Group-By
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Walid G. Aref, Mohamed H. Ali
105
Voted
CPC
2010
95views more  CPC 2010»
15 years 1 days ago
First-Passage Percolation with Exponential Times on a Ladder
We consider first-passage percolation on a ladder, i.e. the graph N
Henrik Renlund