Sciweavers

5130 search results - page 986 / 1026
» Constraint Query Languages
Sort
View
FOCS
2007
IEEE
15 years 5 months ago
Maximizing Non-Monotone Submodular Functions
Submodular maximization generalizes many important problems including Max Cut in directed/undirected graphs and hypergraphs, certain constraint satisfaction problems and maximum f...
Uriel Feige, Vahab S. Mirrokni, Jan Vondrák
INFOCOM
2007
IEEE
15 years 5 months ago
TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
N. Sertac Artan, H. Jonathan Chao
ICDCS
2005
IEEE
15 years 4 months ago
Flexible Consistency for Wide Area Peer Replication
The lack of a flexible consistency management solution hinders P2P implementation of applications involving updates, such as read-write file sharing, directory services, online ...
Sai Susarla, John B. Carter
DEXA
2005
Springer
108views Database» more  DEXA 2005»
15 years 4 months ago
Quality-Aware Replication of Multimedia Data
In contrast to alpha-numerical data, multimedia data can have a wide range of quality parameters such as spatial and temporal resolution, and compression format. Users can request ...
Yi-Cheng Tu, Jingfeng Yan, Sunil Prabhakar
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
15 years 4 months ago
Computational criticisms of the revelation principle
The revelation principle is a cornerstone tool in mechanism design. It states that one can restrict attention, without loss in the designer’s objective, to mechanisms in which A...
Vincent Conitzer, Tuomas Sandholm