Sciweavers

3318 search results - page 605 / 664
» The Weak Instance Model
Sort
View
MST
2011
200views Hardware» more  MST 2011»
13 years 5 months ago
Performance of Scheduling Policies in Adversarial Networks with Non-synchronized Clocks
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model [5] by considering the possibility that the router clocks in the network are not synchronized. W...
Antonio Fernández Anta, José Luis L&...
WWW
2003
ACM
14 years 11 months ago
A Unified Abstraction for Messaging on the Semantic Web
d Abstraction for Messaging on the Semantic Web Dennis Quan IBM Internet Technology 1 Rogers Street Cambridge, MA 02142 USA dennisq@us.ibm.com Karun Bakshi MIT Artificial Intellige...
Dennis Quan, Karun Bakshi, David R. Karger
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
14 years 10 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
KDD
2004
ACM
131views Data Mining» more  KDD 2004»
14 years 10 months ago
Fast nonlinear regression via eigenimages applied to galactic morphology
Astronomy increasingly faces the issue of massive datasets. For instance, the Sloan Digital Sky Survey (SDSS) has so far generated tens of millions of images of distant galaxies, ...
Brigham Anderson, Andrew W. Moore, Andrew Connolly...
EDBT
2006
ACM
179views Database» more  EDBT 2006»
14 years 10 months ago
TrajPattern: Mining Sequential Patterns from Imprecise Trajectories of Mobile Objects
Abstract. Mobile objects have become ubiquitous in our everyday lives, ranging from cellular phones to sensors, therefore, analyzing and mining mobile data becomes an interesting p...
Jiong Yang, Meng Hu