Sciweavers

8655 search results - page 1677 / 1731
» Trusted computing challenges
Sort
View
IM
2007
13 years 11 months ago
Robust Monitoring of Network-wide Aggregates through Gossiping
Abstract—We investigate the use of gossip protocols for continuous monitoring of network-wide aggregates under crash failures. Aggregates are computed from local management varia...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...
SODA
2008
ACM
185views Algorithms» more  SODA 2008»
13 years 11 months ago
Better bounds for online load balancing on unrelated machines
We study the problem of scheduling permanent jobs on unrelated machines when the objective is to minimize the Lp norm of the machine loads. The problem is known as load balancing ...
Ioannis Caragiannis
SPLC
2008
13 years 11 months ago
Filtered Cartesian Flattening: An Approximation Technique for Optimally Selecting Features while Adhering to Resource Constraint
Software Product-lines (SPLs) use modular software components that can be reconfigured into different variants for different requirements sets. Feature modeling is a common method...
Jules White, B. Doughtery, Douglas C. Schmidt
RIAO
2007
13 years 11 months ago
Capturing Sentence Prior for Query-Based Multi-Document Summarization
In this paper, we have considered a real world information synthesis task, generation of a fixed length multi document summary which satisfies a specific information need. This...
Jagadeesh Jagarlamudi, Prasad Pingali, Vasudeva Va...
SDM
2007
SIAM
131views Data Mining» more  SDM 2007»
13 years 11 months ago
Load Shedding in Classifying Multi-Source Streaming Data: A Bayes Risk Approach
In many applications, we monitor data obtained from multiple streaming sources for collective decision making. The task presents several challenges. First, data in sensor networks...
Yijian Bai, Haixun Wang, Carlo Zaniolo
« Prev « First page 1677 / 1731 Last » Next »