Sciweavers

502 search results - page 16 / 101
» Deploying a New Hash Algorithm
Sort
View
WOWMOM
2009
ACM
144views Multimedia» more  WOWMOM 2009»
15 years 6 months ago
A CARMEN mesh experience: deployment and results
When there is no wired connectivity, wireless mesh networks (WMNs) can provide Internet access with lower cost and greater flexibility than traditional approaches. This has motiv...
Pablo Serrano, Antonio de la Oliva, Carlos Jesus B...
KDD
2008
ACM
161views Data Mining» more  KDD 2008»
16 years 2 days ago
Locality sensitive hash functions based on concomitant rank order statistics
: Locality Sensitive Hash functions are invaluable tools for approximate near neighbor problems in high dimensional spaces. In this work, we are focused on LSH schemes where the si...
Kave Eshghi, Shyamsundar Rajaram
WINET
2010
224views more  WINET 2010»
14 years 10 months ago
Hierarchical geographic multicast routing for wireless sensor networks
Wireless sensor networks comprise typically dense deployments of large networks of small wireless capable sensor devices. In such networks, multicast is a fundamental routing servi...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
SIGMOD
1996
ACM
120views Database» more  SIGMOD 1996»
15 years 3 months ago
Query Execution Techniques for Caching Expensive Methods
Object-Relational and Object-Oriented DBMSs allow users to invoke time-consuming ("expensive") methods in their queries. When queries containing these expensive methods a...
Joseph M. Hellerstein, Jeffrey F. Naughton
SPAA
2009
ACM
16 years 7 days ago
Dynamic external hashing: the limit of buffering
Hash tables are one of the most fundamental data structures in computer science, in both theory and practice. They are especially useful in external memory, where their query perf...
Zhewei Wei, Ke Yi, Qin Zhang