Sciweavers

3257 search results - page 631 / 652
» Some Results on Effective Randomness
Sort
View
CIKM
2006
Springer
14 years 1 months ago
Annotation propagation revisited for key preserving views
This paper revisits the analysis of annotation propagation from source databases to views defined in terms of conjunctive (SPJ) queries. Given a source database D, an SPJ query Q,...
Gao Cong, Wenfei Fan, Floris Geerts
DRM
2006
Springer
14 years 1 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver
EUROPAR
2006
Springer
14 years 1 months ago
SEER: Scalable Energy Efficient Relay Schemes in MANETs
In Mobile Ad Hoc Networks (MANETs), broadcasting is widely used to support many applications. Several adaptive broadcast schemes have been proposed to reduce the number of rebroadc...
Lin-Fei Sung, Cheng-Lin Wu, Yi-Kai Chiang, Shyh-In...
CPM
2000
Springer
141views Combinatorics» more  CPM 2000»
14 years 1 months ago
A Lower Bound for the Breakpoint Phylogeny Problem
Breakpoint phylogenies methods have been shown to be an effective way to extract phylogenetic information from gene order data. Currently, the only practical breakpoint phylogeny a...
David Bryant
HPCN
2000
Springer
14 years 1 months ago
An Analytical Model for a Class of Architectures under Master-Slave Paradigm
We build an analytical model for an application utilizing master-slave paradigm. In the model, only three architecture parameters are used: latency, bandwidth and flop rate. Instea...
Yasemin Yalçinkaya, Trond Steihaug