Sciweavers

27692 search results - page 65 / 5539
» Where is ...
Sort
View
SWAT
2004
Springer
129views Algorithms» more  SWAT 2004»
14 years 2 months ago
Online Scheduling of Splittable Tasks in Peer-to-Peer Networks
We consider online scheduling of splittable tasks on parallel machines. In our model, each task can be split into a limited number of parts, that can then be scheduled independentl...
Leah Epstein, Rob van Stee
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
14 years 2 months ago
Architecture of a Mobile Internet
In this paper, we outline the next major evolution of the Internet architecture, where support for mobility is not the exception but the typical case. We show which parts of the I...
Dick Schefström
ICDM
2003
IEEE
143views Data Mining» more  ICDM 2003»
14 years 2 months ago
Active Sampling for Feature Selection
In knowledge discovery applications, where new features are to be added, an acquisition policy can help select the features to be acquired based on their relevance and the cost of...
Sriharsha Veeramachaneni, Paolo Avesani
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 1 months ago
Delayed-Key Message Authentication for Streams
We consider message authentication codes for streams where the key becomes known only at the end of the stream. This usually happens in key-exchange protocols like SSL and TLS wher...
Marc Fischlin, Anja Lehmann
WOLLIC
2010
Springer
14 years 1 months ago
On the Role of the Complementation Rule for Data Dependencies over Incomplete Relations
Recently, an axiomatization for functional dependencies (FDs) and multivalued dependencies (MVDs) has been established where arbitrary attributes can be specified as NOT NULL. Tha...
Flavio Ferrarotti, Sven Hartmann, Sebastian Link