Sciweavers

736 search results - page 68 / 148
» Confidence-Aware Join Algorithms
Sort
View
DEXA
2006
Springer
136views Database» more  DEXA 2006»
15 years 4 months ago
Faster Twig Pattern Matching Using Extended Dewey ID
Finding all the occurrences of a twig pattern in an XML database is a core operation for efficient evaluation of XML queries. Recently, Lu et al. [7] proposed the TJFast algorithm ...
Chung Keung Poon, Leo Yuen
89
Voted
COMAD
2008
15 years 2 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
96
Voted
SODA
2004
ACM
128views Algorithms» more  SODA 2004»
15 years 1 months ago
Computing equilibria for congestion games with (im)perfect information
We study algorithmic questions concerning a basic microeconomic congestion game in which there is a single provider that offers a service to a set of potential customers. Each cus...
René Beier, Artur Czumaj, Piotr Krysta, Ber...
89
Voted
CEC
2010
IEEE
15 years 1 months ago
AGE-P: Moving from concept to technical realization
Even though evolutionary algorithms have been applied to a vast number of problems, they are still not always applicable. As an example, this paper briefly discusses smart applianc...
Stefan Goldmann, Ralf Salomon
114
Voted
DC
2010
15 years 19 days ago
Towards worst-case churn resistant peer-to-peer systems
Abstract Until now, the analysis of fault tolerance of peerto-peer systems usually only covers random faults of some kind. Contrary to traditional algorithmic research, faults as w...
Fabian Kuhn, Stefan Schmid, Roger Wattenhofer