Sciweavers

13214 search results - page 2494 / 2643
» Pseudorandomness for network algorithms
Sort
View
FUIN
2000
68views more  FUIN 2000»
15 years 4 months ago
Models For Dependable Computation with Multiple Inputs and Some Hardness Results
We consider the problem of dependable computation with multiple inputs. The goal is to study when redundancy can help to achieve survivability and when it cannot. We use AND/OR gra...
Yongge Wang, Yvo Desmedt, Mike Burmester
DPD
2002
125views more  DPD 2002»
15 years 4 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung
DPD
2002
126views more  DPD 2002»
15 years 4 months ago
HiCoMo: High Commit Mobile Transactions
Abstract. We introduce a new mobile transaction model applicable to decisionmaking applications over aggregate data warehoused on mobile hosts. The model allows the aggregate data ...
Minsoo Lee, Abdelsalam Helal
ML
2000
ACM
150views Machine Learning» more  ML 2000»
15 years 4 months ago
Adaptive Retrieval Agents: Internalizing Local Context and Scaling up to the Web
This paper discusses a novel distributed adaptive algorithm and representation used to construct populations of adaptive Web agents. These InfoSpiders browse networked information ...
Filippo Menczer, Richard K. Belew
CLEIEJ
1998
57views more  CLEIEJ 1998»
15 years 4 months ago
User-Level Parallel File I/O
Parallel disk I/O subsystems are becoming more important in today’s large-scale parallel machines. Parallel disk systems provide a significant boost in I/O performance reducing ...
Ernst L. Leiss, Yili Wang
« Prev « First page 2494 / 2643 Last » Next »