Sciweavers

SIAMCOMP
2012
12 years 2 months ago
Tabulation-Based 5-Independent Hashing with Applications to Linear Probing and Second Moment Estimation
Abstract. In the framework of Carter and Wegman, a k-independent hash function maps any k keys independently. It is known that 5independent hashing provides good expected performan...
Mikkel Thorup, Yin Zhang
SDM
2012
SIAM
452views Data Mining» more  SDM 2012»
12 years 2 months ago
Density-based Projected Clustering over High Dimensional Data Streams
Clustering of high dimensional data streams is an important problem in many application domains, a prominent example being network monitoring. Several approaches have been lately ...
Irene Ntoutsi, Arthur Zimek, Themis Palpanas, Peer...
ICDE
2012
IEEE
291views Database» more  ICDE 2012»
12 years 11 months ago
Efficiently Monitoring Top-k Pairs over Sliding Windows
Top-k pairs queries have received significant attention by the research community. k-closest pairs queries, k-furthest pairs queries and their variants are among the most well stu...
Zhitao Shen, Muhammad Aamir Cheema, Xuemin Lin, We...
DGO
2011
285views Education» more  DGO 2011»
13 years 6 days ago
Social media use by government: from the routine to the critical
Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other services with user-generated content have made a staggering amount of information (and misinformation) available....
Andrea L. Kavanaugh, Edward A. Fox, Steven D. Shee...
CCS
2011
ACM
13 years 12 days ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
BNCOD
2011
356views Database» more  BNCOD 2011»
13 years 12 days ago
Achieving High Freshness and Optimal Throughput in CPU-Limited Execution of Multi-join Continuous Queries
Due to high data volumes and unpredictable arrival rates, continuous query systems processing expensive queries in real-time may fail to keep up with the input data streams - resul...
Abhishek Mukherji, Elke A. Rundensteiner, Matthew ...
SAC
2011
ACM
13 years 3 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
TWC
2010
13 years 7 months ago
On overloaded vector precoding for single-user MIMO channels
We address the possibility of overloaded vector precoding in single user MIMO channels, i.e. the number of data streams is larger than the minimum of the number of antennas at tran...
R. De Miguel, Vesna Gardasevic, Ralf R. Mülle...
JMLR
2010
146views more  JMLR 2010»
13 years 7 months ago
Accurate Ensembles for Data Streams: Combining Restricted Hoeffding Trees using Stacking
The success of simple methods for classification shows that is is often not necessary to model complex attribute interactions to obtain good classification accuracy on practical p...
Albert Bifet, Eibe Frank, Geoffrey Holmes, Bernhar...
TWC
2011
272views more  TWC 2011»
13 years 7 months ago
On the Study of Analogue Network Coding for Multi-Pair, Bidirectional Relay Channels
—We consider a scenario where multiple pairs of users exchange information within pair with the help of a dedicated multi-antenna relay. The co-channel interference among multipl...
Chee Yen Leow, Zhiguo Ding, Kin K. Leung, Dennis G...