Sciweavers

281 search results - page 11 / 57
» Toward Practical Constraint Databases
Sort
View
DASFAA
2009
IEEE
129views Database» more  DASFAA 2009»
14 years 2 months ago
Towards Preference-Constrained k-Anonymisation
Abstract. In this paper, we propose a novel preference-constrained approach to k-anonymisation. In contrast to the existing works on kanonymisation which attempt to satisfy a minim...
Grigorios Loukides, Achilles Tziatzios, Jianhua Sh...
EDBT
2012
ACM
271views Database» more  EDBT 2012»
11 years 9 months ago
Towards a decentralised hierarchical architecture for smart grids
We present a hierarchical distributed communication and control architecture for Smart Grids. The proposed topology consists of multiple layers to allow for robust and flexible d...
Daniel Rech, Andreas Harth
ICMCS
2006
IEEE
94views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Evaluation of Practical Scalability of Overlay Networks in Providing Video-on-Demand Service
Recently, overlay networks have been proposed to address the problem of scalability in providing video-on-demand (VoD) service. However, from the perspective of service providing,...
Jian-Guang Luo, Yun Tang, Jiang Zhang, Shiqiang Ya...
ICPP
2009
IEEE
14 years 2 months ago
Improving Resource Availability by Relaxing Network Allocation Constraints on Blue Gene/P
— High-end computing (HEC) systems have passed the petaflop barrier and continue to move toward the next frontier of exascale computing. As companies and research institutes con...
Narayan Desai, Darius Buntinas, Daniel Buettner, P...
PEPM
1995
ACM
13 years 11 months ago
Towards Creating Specialised Integrity Checks through Partial Evaluation of Meta-Interpreters
In [23] we presented a partial evaluation scheme for a “real life” subset of Prolog, containing first-order built-in’s, simple side-effects and the operational predicate i...
Michael Leuschel, Danny De Schreye