Sciweavers

10602 search results - page 2059 / 2121
» Weakly Useful Sequences
Sort
View
FOCS
2009
IEEE
15 years 11 months ago
Dynamic and Non-uniform Pricing Strategies for Revenue Maximization
We consider the Item Pricing problem for revenue maximization in the limited supply setting, where a single seller with n items caters to m buyers with unknown subadditive valuati...
Tanmoy Chakraborty, Zhiyi Huang, Sanjeev Khanna
158
Voted
ICAS
2009
IEEE
168views Robotics» more  ICAS 2009»
15 years 11 months ago
Impact of Video Content on Video Quality for Video over Wireless Networks
—Video streaming is a promising multimedia application and is gaining popularity over wireless/mobile communications. The quality of the video depends heavily on the type of cont...
Asiya Khan, Lingfen Sun, Emmanuel C. Ifeachor
154
Voted
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 11 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
155
Voted
ICDM
2009
IEEE
112views Data Mining» more  ICDM 2009»
15 years 11 months ago
Spatio-temporal Multi-dimensional Relational Framework Trees
—The real world is composed of sets of objects that move and morph in both space and time. Useful concepts can be defined in terms of the complex interactions between the multi-...
Matthew Bodenhamer, Samuel Bleckley, Daniel Fennel...
INFOCOM
2009
IEEE
15 years 11 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
« Prev « First page 2059 / 2121 Last » Next »