Sciweavers

10797 search results - page 2060 / 2160
» Robust control applications
Sort
View
STOC
2003
ACM
152views Algorithms» more  STOC 2003»
16 years 3 months ago
Reducing truth-telling online mechanisms to online optimization
We describe a general technique for converting an online algorithm B to a truthtelling mechanism. We require that the original online competitive algorithm has certain "nicen...
Baruch Awerbuch, Yossi Azar, Adam Meyerson
135
Voted
OSDI
2002
ACM
16 years 3 months ago
Vertigo: Automatic Performance-Setting for Linux
Combining high performance with low power consumption is becoming one of the primary objectives of processor designs. Instead of relying just on sleep mode for conserving power, a...
Krisztián Flautner, Trevor N. Mudge
SIGMOD
2009
ACM
136views Database» more  SIGMOD 2009»
16 years 3 months ago
A comparison of approaches to large-scale data analysis
There is currently considerable enthusiasm around the MapReduce (MR) paradigm for large-scale data analysis [17]. Although the basic control flow of this framework has existed in ...
Andrew Pavlo, Erik Paulson, Alexander Rasin, Danie...
251
Voted
SIGMOD
2009
ACM
235views Database» more  SIGMOD 2009»
16 years 3 months ago
Quality and efficiency in high dimensional nearest neighbor search
Nearest neighbor (NN) search in high dimensional space is an important problem in many applications. Ideally, a practical solution (i) should be implementable in a relational data...
Yufei Tao, Ke Yi, Cheng Sheng, Panos Kalnis
223
Voted
SIGMOD
2009
ACM
258views Database» more  SIGMOD 2009»
16 years 3 months ago
Continuous obstructed nearest neighbor queries in spatial databases
In this paper, we study a novel form of continuous nearest neighbor queries in the presence of obstacles, namely continuous obstructed nearest neighbor (CONN) search. It considers...
Yunjun Gao, Baihua Zheng
« Prev « First page 2060 / 2160 Last » Next »