Sciweavers

664 search results - page 110 / 133
» Adaptive Selectivity Estimation Using Query Feedback
Sort
View
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
JODL
2000
76views more  JODL 2000»
14 years 11 months ago
Strategy-based interactive cluster visualization for information retrieval
Abstract. In this paper we investigate a general purpose interactive information organization system. The system organizes documents by placing them into 1-, 2-, or 3-dimensional s...
Anton Leuski, James Allan
ATAL
2010
Springer
15 years 27 days ago
Role evolution in Open Multi-Agent Systems as an information source for trust
In Open Multi-Agent Systems (OMAS), deciding with whom to interact is a particularly difficult task for an agent, as repeated interactions with the same agents are scarce, and rep...
Ramón Hermoso, Holger Billhardt, Sascha Oss...
MOBIHOC
2005
ACM
15 years 11 months ago
Efficient geographic routing in multihop wireless networks
We propose a new link metric called normalized advance (NADV) for geographic routing in multihop wireless networks. NADV selects neighbors with the optimal trade-off between proxi...
Seungjoon Lee, Bobby Bhattacharjee, Suman Banerjee
ICAC
2005
IEEE
15 years 5 months ago
Feedback-based Scheduling for Back-end Databases in Shared Dynamic Content Server Clusters
This paper introduces a self-configuring architecture for scaling the database tier of dynamic content web servers. We use a unified approach to load and fault management based ...
Gokul Soundararajan, Kaloian Manassiev, Jin Chen, ...