Sciweavers

13214 search results - page 2608 / 2643
» Pseudorandomness for network algorithms
Sort
View
IPPS
2002
IEEE
14 years 14 days ago
Enforcing Resource Sharing Agreements among Distributed Server Clusters
Future scalable, high throughput, and high performance applications are likely to execute on platforms constructed by clustering multiple autonomous distributed servers, with reso...
Tao Zhao, Vijay Karamcheti
MSE
2002
IEEE
198views Hardware» more  MSE 2002»
14 years 14 days ago
BSS: A New Approach for Watermark Attack
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...
SIGMETRICS
2010
ACM
208views Hardware» more  SIGMETRICS 2010»
14 years 11 days ago
Dynamics in congestion games
Game theoretic modeling and equilibrium analysis of congestion games have provided insights in the performance of Internet congestion control, road transportation networks, etc. D...
Devavrat Shah, Jinwoo Shin
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 11 days ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
DCOSS
2010
Springer
14 years 11 days ago
MetroTrack: Predictive Tracking of Mobile Events Using Mobile Phones
We propose to use mobile phones carried by people in their everyday lives as mobile sensors to track mobile events. We argue that sensor-enabled mobile phones are best suited to de...
Gahng-Seop Ahn, Mirco Musolesi, Hong Lu, Reza Olfa...
« Prev « First page 2608 / 2643 Last » Next »