Sciweavers

813 search results - page 152 / 163
» desire 2010
Sort
View
PVLDB
2010
133views more  PVLDB 2010»
13 years 8 months ago
RoadTrack: Scaling Location Updates for Mobile Clients on Road Networks with Query Awareness
Mobile commerce and location based services (LBS) are some of the fastest growing IT industries in the last five years. Location update of mobile clients is a fundamental capabil...
Péter Pesti, Ling Liu, Bhuvan Bamba, Arun I...
QUESTA
2010
112views more  QUESTA 2010»
13 years 8 months ago
Admission control for a multi-server queue with abandonment
In a M/M/N+M queue, when there are many customers waiting, it may be preferable to reject a new arrival rather than risk that arrival later abandoning without receiving service. O...
Yasar Levent Koçaga, Amy R. Ward
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 8 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
SIAMCOMP
2010
174views more  SIAMCOMP 2010»
13 years 8 months ago
On the Complexity of Nash Equilibria and Other Fixed Points
We reexamine what it means to compute Nash equilibria and, more generally, what it means to compute a fixed point of a given Brouwer function, and we investigate the complexity o...
Kousha Etessami, Mihalis Yannakakis
SIAMSC
2010
141views more  SIAMSC 2010»
13 years 8 months ago
An Iterative Method for Edge-Preserving MAP Estimation When Data-Noise Is Poisson
In numerous applications of image processing, e.g. astronomical and medical imaging, data-noise is well-modeled by a Poisson distribution. This motivates the use of the negative-lo...
Johnathan M. Bardsley, John Goldes