Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
TPDS
2002
53views more  TPDS 2002»
11 years 1 months ago
Optimal Tree Access by Elementary and Composite Templates in Parallel Memory Systems
Vincenzo Auletta, Sajal K. Das, Amelia De Vivo, Ma...
JSS
2000
123views more  JSS 2000»
11 years 1 months ago
Approaches for broadcasting temporal data in mobile computing systems
Rapid advances in mobile communication technology have spawned many new mobile applications. A key element in many of these systems is the need to distribute real-time information...
Kam-yiu Lam, Edward Chan, Joe Chun-Hung Yuen
JDA
2007
135views more  JDA 2007»
11 years 1 months ago
Cache placement in sensor networks under an update cost constraint
In this paper, we address an optimization problem that arises in the context of cache placement in sensor networks. In particular, we consider the cache placement problem where th...
Bin Tang, Himanshu Gupta
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
11 years 2 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
DEXAW
2000
IEEE
160views Database» more  DEXAW 2000»
11 years 5 months ago
An Adaptive AVI-Based Cache Invalidation Scheme for Mobile Computing Systems
In a mobile computing system, caching data items at the mobile clients is important to reduce the data access delay in a unreliable and low bandwidth mobile network. However, effi...
Joe Chun-Hung Yuen, Edward Chan, Kam-yiu Lam, Hei-...
ADHOCNOW
2005
Springer
11 years 7 months ago
Cache Placement in Sensor Networks Under Update Cost Constraint
— In this paper, we address an optimization problem that arises in context of cache placement in sensor networks. In particular, we consider the cache placement problem where the...
Bin Tang, Samir R. Das, Himanshu Gupta
WOWMOM
2005
ACM
127views Multimedia» more  WOWMOM 2005»
11 years 7 months ago
Game Theoretic Power Aware Wireless Data Access
Abstract—This paper examines the following wireless data access scenario: a number of clients are interested in a set of data items kept at the server. A client sends a query req...
Mark Kai Ho Yeung, Yu-Kwong Kwok
ICDCS
2005
IEEE
11 years 7 months ago
On Exploring Channel Allocation in the Diverse Data Broadcasting Environment
In recent years, data broadcasting becomes a promising technique to design a mobile information system with power conservation, high scalability and high bandwidth utilization. Ho...
Hao-Ping Hung, Ming-Syan Chen
SSDBM
2006
IEEE
129views Database» more  SSDBM 2006»
11 years 7 months ago
Indexing Time-Evolving Data With Variable Lifetimes
Many applicationsstore data items for a pre-determined, finite length of time. Examples include slidingwindows over on-line data streams, where old data are dropped as the window...
Lukasz Golab, Piyush Prahladka, M. Tamer Özsu
ISM
2006
IEEE
86views Multimedia» more  ISM 2006»
11 years 7 months ago
OreDesk: A Tool for Retrieving Data History Based on User Operations
During day-to-day activities, a user refers to various data items on a PC, such as documents, images, and audio clips. However, when the number of items in the history increases, ...
Ryo Ohsawa, Kazunori Takashio, Hideyuki Tokuda
books