Sciweavers

898 search results - page 13 / 180
» A Linear Tabling Mechanism
Sort
View
NDSS
2006
IEEE
15 years 11 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...
136
Voted
ISLPED
2006
ACM
73views Hardware» more  ISLPED 2006»
15 years 11 months ago
Substituting associative load queue with simple hash tables in out-of-order microprocessors
Buffering more in-flight instructions in an out-of-order microprocessor is a straightforward and effective method to help tolerate the long latencies generally associated with ...
Alok Garg, Fernando Castro, Michael C. Huang, Dani...
132
Voted
EUC
2005
Springer
15 years 10 months ago
Distributed Contextual Information Storage Using Content-Centric Hash Tables
We analyze the problem of storing contextual information across a set of distributed heterogeneous mobile devices. These devices form a Mobile Ad Hoc Network (MANET) interconnected...
Ignacio Nieto-Carvajal, Juan A. Botía, Pedr...
PODS
2010
ACM
197views Database» more  PODS 2010»
15 years 5 months ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
120
Voted
TIFS
2008
109views more  TIFS 2008»
15 years 4 months ago
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks
Today, mass-scale electronic content distribution systems embed forensic tracking watermarks primarily at the distribution server. For limiting the bandwidth usage and server compl...
Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbe...