Sciweavers

PVLDB
2010
82views more  PVLDB 2010»
13 years 2 months ago
Record Linkage with Uniqueness Constraints and Erroneous Values
Many data-management applications require integrating data from a variety of sources, where different sources may refer to the same real-world entity in different ways and some ma...
Songtao Guo, Xin Dong, Divesh Srivastava, Remi Zaj...
ISAAC
2005
Springer
117views Algorithms» more  ISAAC 2005»
13 years 10 months ago
Basic Computations in Wireless Networks
Abstract. In this paper we address the problem of estimating the number of stations in a wireless network. Under the assumption that each station can detect collisions, we show tha...
Ioannis Caragiannis, Clemente Galdi, Christos Kakl...
SRDS
2006
IEEE
13 years 10 months ago
Reliably Executing Tasks in the Presence of Untrusted Entities
In this work we consider a distributed system formed by a master processor and a collection of n processors (workers) that can execute tasks; worker processors are untrusted and m...
Antonio Fernández, Luis López, Agust...
PRDC
2008
IEEE
13 years 11 months ago
VTV - A Voting Strategy for Real-Time Systems
Real-time applications typically have to satisfy high dependability requirements and require fault tolerance in both value and time domains. A widely used approach to ensure fault...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...