Sciweavers

71228 search results - page 14240 / 14246
» Algorithms
Sort
View
EUROSYS
2006
ACM
15 years 6 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
SOSP
2007
ACM
15 years 6 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
INFOCOM
2009
IEEE
15 years 4 months ago
An Experimental Evaluation of Rate Adaptation for Multi-Antenna Systems
—Increasingly wireless networks use multi-antenna nodes as in IEEE 802.11n and 802.16. The Physical layer (PHY) in such systems may use the antennas to provide multiple streams o...
Wonsoo Kim, O. Khan, Kien T. Truong, Soon-Hyeok Ch...
FCT
2009
Springer
15 years 4 months ago
Competitive Group Testing and Learning Hidden Vertex Covers with Minimum Adaptivity
Suppose that we are given a set of n elements d of which are “defective”. A group test can check for any subset, called a pool, whether it contains a defective. It is well know...
Peter Damaschke, Azam Sheikh Muhammad
FSTTCS
2009
Springer
15 years 4 months ago
Fractional Pebbling and Thrifty Branching Programs
We study the branching program complexity of the tree evaluation problem, introduced in [BCM+09a] as a candidate for separating NL from LogCFL. The input to the problem is a roote...
Mark Braverman, Stephen A. Cook, Pierre McKenzie, ...
« Prev « First page 14240 / 14246 Last » Next »