Sciweavers

2922 search results - page 505 / 585
» Scalable Algorithms for Distribution Search
Sort
View
CCS
2008
ACM
13 years 11 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
DEBS
2008
ACM
13 years 10 months ago
Extending Siena to support more expressive and flexible subscriptions
This paper defines and discusses the implementation of two novel extensions to the Siena Content-based Network (CBN) to extend it to become a Knowledge-based Network (KBN) thereby...
John Keeney, Dominik Roblek, Dominic Jones, David ...
DEBS
2008
ACM
13 years 10 months ago
An adaptive approach for ensuring reliability in event based middleware
In this effort we tackle the important issue of providing Quality of Service (QoS) guarantees to subscribers, when routing event notifications in a publish-subscribe domain. In ...
Shruti P. Mahambre, Umesh Bellur
PERVASIVE
2008
Springer
13 years 9 months ago
Localized power-aware routing in linear wireless sensor networks
Energy-efficency is a key concern when designing protocols for wireless sensor networks (WSN). This is of particular importance in commercial applications where demonstrable retur...
Marco Zimmerling, Waltenegus Dargie, Johnathan M. ...
TOG
2002
156views more  TOG 2002»
13 years 8 months ago
Chromium: a stream-processing framework for interactive rendering on clusters
We describe Chromium, a system for manipulating streams of graphics API commands on clusters of workstations. Chromium's stream filters can be arranged to create sort-first a...
Greg Humphreys, Mike Houston, Ren Ng, Randall Fran...