Sciweavers

PVLDB
2010
82views more  PVLDB 2010»
13 years 11 months ago
Record Linkage with Uniqueness Constraints and Erroneous Values
Many data-management applications require integrating data from a variety of sources, where different sources may refer to the same real-world entity in different ways and some ma...
Songtao Guo, Xin Dong, Divesh Srivastava, Remi Zaj...
ISAAC
2005
Springer
117views Algorithms» more  ISAAC 2005»
14 years 6 months ago
Basic Computations in Wireless Networks
Abstract. In this paper we address the problem of estimating the number of stations in a wireless network. Under the assumption that each station can detect collisions, we show tha...
Ioannis Caragiannis, Clemente Galdi, Christos Kakl...
SRDS
2006
IEEE
14 years 6 months ago
Reliably Executing Tasks in the Presence of Untrusted Entities
In this work we consider a distributed system formed by a master processor and a collection of n processors (workers) that can execute tasks; worker processors are untrusted and m...
Antonio Fernández, Luis López, Agust...
PRDC
2008
IEEE
14 years 6 months ago
VTV - A Voting Strategy for Real-Time Systems
Real-time applications typically have to satisfy high dependability requirements and require fault tolerance in both value and time domains. A widely used approach to ensure fault...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...