Sciweavers

1599 search results - page 308 / 320
» Probabilistic Analysis of Anonymity
Sort
View
ICRA
2002
IEEE
187views Robotics» more  ICRA 2002»
14 years 25 days ago
Trajectory Planning using Reachable-State Density Functions
:This paper presents a trajectory planning algorithm for mobile robots which may be subject to kinodynamic constraints. Using computational methods from noncommutative harmonic ana...
Richard Mason, Joel W. Burdick
WISE
2002
Springer
14 years 24 days ago
An Update-Risk Based Approach to TTL Estimation in Web Caching
Web caching is an important technique for accelerating web applications and reducing the load on the web server and the network through local cache accesses. As in the traditional...
Jeong-Joon Lee, Kyu-Young Whang, Byung Suk Lee, Ji...
FOCS
2000
IEEE
14 years 9 days ago
Stable Distributions, Pseudorandom Generators, Embeddings and Data Stream Computation
In this article, we show several results obtained by combining the use of stable distributions with pseudorandom generators for bounded space. In particular: —We show that, for a...
Piotr Indyk
INFOCOM
1998
IEEE
14 years 4 days ago
Limited Wavelength Translation in All-Optical WDM Mesh Networks
We analyze limited wavelength translation in all-optical, wavelength division multiplexed (WDM) wraparound mesh networks, where upto W wavelengths, each of which can carry one circ...
Vishal Sharma, Emmanouel A. Varvarigos
SIGMOD
1993
ACM
163views Database» more  SIGMOD 1993»
13 years 12 months ago
The LRU-K Page Replacement Algorithm For Database Disk Buffering
This paper introduces a new approach to database disk buffering, called the LRU–K method. The basic idea of LRU–K is to keep track of the times of the last K references to pop...
Elizabeth J. O'Neil, Patrick E. O'Neil, Gerhard We...