Sciweavers

2061 search results - page 324 / 413
» Authorization for Metacomputing Applications
Sort
View
102
Voted
STOC
2005
ACM
135views Algorithms» more  STOC 2005»
16 years 28 days ago
On the bias of traceroute sampling: or, power-law degree distributions in regular graphs
Understanding the graph structure of the Internet is a crucial step for building accurate network models and designing efficient algorithms for Internet applications. Yet, obtaini...
Dimitris Achlioptas, Aaron Clauset, David Kempe, C...
105
Voted
STOC
2005
ACM
96views Algorithms» more  STOC 2005»
16 years 28 days ago
Every monotone graph property is testable
A graph property is called monotone if it is closed under taking (not necessarily induced) subgraphs (or, equivalently, if it is closed under removal of edges and vertices). Many ...
Noga Alon, Asaf Shapira
199
Voted
SIGMOD
2008
ACM
159views Database» more  SIGMOD 2008»
16 years 23 days ago
Bootstrapping pay-as-you-go data integration systems
Data integration systems offer a uniform interface to a set of data sources. Despite recent progress, setting up and maintaining a data integration application still requires sign...
Anish Das Sarma, Xin Dong, Alon Y. Halevy
94
Voted
ICDE
2010
IEEE
247views Database» more  ICDE 2010»
16 years 11 days ago
Efficient Verification of Shortest Path Search via Authenticated Hints
Shortest path search in transportation networks is unarguably one of the most important online search services nowadays (e.g., Google Maps, MapQuest, etc), with applications spanni...
Man Lung Yiu, Yimin Lin, Kyriakos Mouratidis
EUROSYS
2009
ACM
15 years 9 months ago
Isolating web programs in modern browser architectures
Many of today’s web sites contain substantial amounts of client-side code, and consequently, they act more like programs than simple documents. This creates robustness and perfo...
Charles Reis, Steven D. Gribble