Sciweavers

5344 search results - page 1029 / 1069
» Privacy-Preserving Set Operations
Sort
View
CIDR
2009
141views Algorithms» more  CIDR 2009»
13 years 11 months ago
Sailing the Information Ocean with Awareness of Currents: Discovery and Application of Source Dependence
The Web has enabled the availability of a huge amount of useful information, but has also eased the ability to spread false information and rumors across multiple sources, making ...
Laure Berti-Equille, Anish Das Sarma, Xin Dong, Am...
HPDC
2010
IEEE
13 years 11 months ago
Cloud computing paradigms for pleasingly parallel biomedical applications
Cloud computing offers new approaches for scientific computing that leverage the major commercial hardware and software investment in this area. Closely coupled applications are s...
Thilina Gunarathne, Tak-Lon Wu, Judy Qiu, Geoffrey...
HPDC
2010
IEEE
13 years 11 months ago
XCo: explicit coordination to prevent network fabric congestion in cloud computing cluster platforms
Large cluster-based cloud computing platforms increasingly use commodity Ethernet technologies, such as Gigabit Ethernet, 10GigE, and Fibre Channel over Ethernet (FCoE), for intra...
Vijay Shankar Rajanna, Smit Shah 0002, Anand Jahag...
MM
2010
ACM
251views Multimedia» more  MM 2010»
13 years 10 months ago
A cognitive approach for effective coding and transmission of 3D video
Reliable delivery of 3D video contents to a wide set of users is expected to be the next big revolution in multimedia applications provided that it is possible to grant a certain ...
Simone Milani, Giancarlo Calvagno
SIGCOMM
2010
ACM
13 years 10 months ago
Rethinking iBGP routing
The Internet is organized as a collection of administrative domains, known as Autonomous Systems (ASes). These ASes interact through the Border Gateway Protocol (BGP) that allows ...
Iuniana M. Oprescu, Mickael Meulle, Steve Uhlig, C...
« Prev « First page 1029 / 1069 Last » Next »