Sciweavers

12257 search results - page 2305 / 2452
» Analysis of Algorithms
Sort
View
144
Voted
STACS
2012
Springer
13 years 10 months ago
The Denjoy alternative for computable functions
The Denjoy-Young-Saks Theorem from classical analysis states that for an arbitrary function f : R → R, the Denjoy alternative holds outside a null set, i.e., for almost every re...
Laurent Bienvenu, Rupert Hölzl, Joseph S. Mil...
189
Voted
SIGMOD
2012
ACM
212views Database» more  SIGMOD 2012»
13 years 5 months ago
Local structure and determinism in probabilistic databases
While extensive work has been done on evaluating queries over tuple-independent probabilistic databases, query evaluation over correlated data has received much less attention eve...
Theodoros Rekatsinas, Amol Deshpande, Lise Getoor
INFOCOM
2012
IEEE
13 years 5 months ago
Memory-assisted universal compression of network flows
—Recently, the existence of considerable amount of redundancy in the Internet traffic has stimulated the deployment of several redundancy elimination techniques within the netwo...
Mohsen Sardari, Ahmad Beirami, Faramarz Fekri
142
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
CARPO: Correlation-aware power optimization in data center networks
—Power optimization has become a key challenge in the design of large-scale enterprise data centers. Existing research efforts focus mainly on computer servers to lower their ene...
Xiaodong Wang, Yanjun Yao, Xiaorui Wang, Kefa Lu, ...
170
Voted
SIGIR
2012
ACM
13 years 5 months ago
Fighting against web spam: a novel propagation method based on click-through data
Combating Web spam is one of the greatest challenges for Web search engines. State-of-the-art anti-spam techniques focus mainly on detecting varieties of spam strategies, such as ...
Chao Wei, Yiqun Liu, Min Zhang, Shaoping Ma, Liyun...
« Prev « First page 2305 / 2452 Last » Next »