Sciweavers

2416 search results - page 391 / 484
» The design and implementation of typed scheme
Sort
View
SIGMOD
2002
ACM
219views Database» more  SIGMOD 2002»
14 years 7 months ago
Efficient k-NN search on vertically decomposed data
Applications like multimedia retrieval require efficient support for similarity search on large data collections. Yet, nearest neighbor search is a difficult problem in high dimen...
Arjen P. de Vries, Nikos Mamoulis, Niels Nes, Mart...
EWSN
2008
Springer
14 years 7 months ago
Resilient Coding Algorithms for Sensor Network Data Persistence
Storing and disseminating coded information instead of the original data can bring significant performance improvements to sensor network protocols. Such methods reduce the risk of...
Daniele Munaretto, Jörg Widmer, Michele Rossi...
ICDCS
2009
IEEE
14 years 4 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
EUROSYS
2009
ACM
14 years 4 months ago
Koala: a platform for OS-level power management
Managing the power consumption of computing platforms is a complicated problem thanks to a multitude of hardware configuration options and characteristics. Much of the academic r...
David C. Snowdon, Etienne Le Sueur, Stefan M. Pett...
INFOCOM
2009
IEEE
14 years 2 months ago
CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast
—We present CPM, a unified approach that exploits server multicast, assisted by peer downloads, to provide efficient video-on-demand (VoD) in a service provider environment. We...
Vijay Gopalakrishnan, Samrat Bhattacharjee, K. K. ...