Sciweavers

23589 search results - page 4654 / 4718
» Uncheatable Distributed Computations
Sort
View
150
Voted
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 7 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
144
Voted
ICNP
2002
IEEE
15 years 7 months ago
QoS Extension to BGP
To enable the end-to-end Quality of Service (QoS) guarantees in the Internet, based on the Border Gateway Protocol (BGP), inter-domain QoS advertising and routing are important. H...
Li Xiao, King-Shan Lui, Jun Wang, Klara Nahrstedt
99
Voted
ICPP
2002
IEEE
15 years 7 months ago
A Selection Technique for Replicated Multicast Video Servers
Abstract— In this paper, we propose a selection technique for replicated multicast video streams from different servers. We assume that there exist replicated video servers, each...
Akihito Hiromori, Hirozumi Yamaguchi, Keiichi Yasu...
130
Voted
ICPP
2002
IEEE
15 years 7 months ago
Software Caching using Dynamic Binary Rewriting for Embedded Devices
A software cache implements instruction and data caching entirely in software. Dynamic binary rewriting offers a means to specialize the software cache miss checks at cache miss t...
Chad Huneycutt, Joshua B. Fryman, Kenneth M. Macke...
ICPPW
2002
IEEE
15 years 7 months ago
Dynamic Expansion of M : N Protection Groups in GMPLS Optical Networks
Abstract— In order to provide reliable connections across metropolitan and wide-area optical networks, the network operator must provide some degree of redundancy so that traffic...
David W. Griffith, SuKyoung Lee
« Prev « First page 4654 / 4718 Last » Next »