Sciweavers

5448 search results - page 945 / 1090
» Breakpoints and Time in Distributed Computations
Sort
View
ICDCS
2010
IEEE
15 years 29 days ago
Complexity Analysis of Weak Multitolerance
—In this paper, we classify multitolerant systems, i.e., systems that tolerate multiple classes of faults and provide potentially different levels of tolerance to them in terms o...
Jingshu Chen, Sandeep Kulkarni
113
Voted
MIDDLEWARE
2010
Springer
14 years 11 months ago
FaReCast: Fast, Reliable Application Layer Multicast for Flash Dissemination
Abstract. To disseminate messages from a single source to a large number of targeted receivers, a natural approach is the tree-based application layer multicast (ALM). However, in ...
Kyungbaek Kim, Sharad Mehrotra, Nalini Venkatasubr...
FOCS
2010
IEEE
14 years 10 months ago
Boosting and Differential Privacy
Boosting is a general method for improving the accuracy of learning algorithms. We use boosting to construct improved privacy-preserving synopses of an input database. These are da...
Cynthia Dwork, Guy N. Rothblum, Salil P. Vadhan
ICPADS
2010
IEEE
14 years 10 months ago
Utilizing RF Interference to Enable Private Estimation in RFID Systems
Counting or estimating the number of tags is crucial for RFID system. Researchers have proposed several fast cardinality estimation schemes to estimate the quantity of a batch of ...
Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Zhuo L...
101
Voted
IPPS
2010
IEEE
14 years 10 months ago
Performance and energy optimization of concurrent pipelined applications
In this paper, we study the problem of finding optimal mappings for several independent but concurrent workflow applications, in order to optimize performance-related criteria tog...
Anne Benoit, Paul Renaud-Goud, Yves Robert