Sciweavers

1510 search results - page 222 / 302
» Secure Distributed Data Aggregation
Sort
View
EMMCVPR
2003
Springer
14 years 2 months ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero
IMC
2009
ACM
14 years 4 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
CIDR
2003
138views Algorithms» more  CIDR 2003»
13 years 11 months ago
AIMS: An Immersidata Management System
We introduce a system to address the challenges involved in managing the multidimensional sensor data streams generated within immersive environments. We call this data type, imme...
Cyrus Shahabi
CCGRID
2011
IEEE
13 years 1 months ago
High Performance Pipelined Process Migration with RDMA
—Coordinated Checkpoint/Restart (C/R) is a widely deployed strategy to achieve fault-tolerance. However, C/R by itself is not capable enough to meet the demands of upcoming exasc...
Xiangyong Ouyang, Raghunath Rajachandrasekar, Xavi...
CCGRID
2008
IEEE
14 years 4 months ago
A Stable Broadcast Algorithm
—Distributing large data to many nodes, known as a broadcast or a multicast, is an important operation in parallel and distributed computing. Most previous broadcast algorithms e...
Kei Takahashi, Hideo Saito, Takeshi Shibata, Kenji...