Sciweavers

3637 search results - page 714 / 728
» Application of Network Calculus to Guaranteed Service Networ...
Sort
View
SECON
2010
IEEE
14 years 9 months ago
Utility-Based Gateway Deployment for Supporting Multi-Domain DTNs
Abstract--Due to technology or policy constraints, communications across network domains usually require the intervention of gateways, and their proper deployment is crucial to the...
Ting He, Kang-Won Lee, Nikoletta Sofra, Kin K. Leu...
KDD
2012
ACM
196views Data Mining» more  KDD 2012»
13 years 2 months ago
Chromatic correlation clustering
We study a novel clustering problem in which the pairwise relations between objects are categorical. This problem can be viewed as clustering the vertices of a graph whose edges a...
Francesco Bonchi, Aristides Gionis, Francesco Gull...
PODC
2012
ACM
13 years 2 months ago
Iterative approximate byzantine consensus in arbitrary directed graphs
This paper proves a necessary and sufficient condition for the existence of iterative algorithms that achieve approximate Byzantine consensus in arbitrary directed graphs, where e...
Nitin H. Vaidya, Lewis Tseng, Guanfeng Liang
VLDB
2008
ACM
147views Database» more  VLDB 2008»
15 years 12 months ago
Tree-based partition querying: a methodology for computing medoids in large spatial datasets
Besides traditional domains (e.g., resource allocation, data mining applications), algorithms for medoid computation and related problems will play an important role in numerous e...
Kyriakos Mouratidis, Dimitris Papadias, Spiros Pap...
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
15 years 6 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter