Sciweavers

1363 search results - page 249 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
126
Voted
SIGMETRICS
2010
ACM
233views Hardware» more  SIGMETRICS 2010»
15 years 3 months ago
Incentivizing peer-assisted services: a fluid shapley value approach
A new generation of content delivery networks for live streaming, video on demand, and software updates takes advantage of a peer-to-peer architecture to reduce their operating co...
Vishal Misra, Stratis Ioannidis, Augustin Chaintre...
SIGMETRICS
2010
ACM
208views Hardware» more  SIGMETRICS 2010»
15 years 3 months ago
Dynamics in congestion games
Game theoretic modeling and equilibrium analysis of congestion games have provided insights in the performance of Internet congestion control, road transportation networks, etc. D...
Devavrat Shah, Jinwoo Shin
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
15 years 3 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
ICSE
2010
IEEE-ACM
15 years 3 months ago
Adaptive bug isolation
Statistical debugging uses lightweight instrumentation and statistical models to identify program behaviors that are strongly predictive of failure. However, most software is most...
Piramanayagam Arumuga Nainar, Ben Liblit
CDC
2009
IEEE
151views Control Systems» more  CDC 2009»
15 years 3 months ago
A poset framework to model decentralized control problems
— In this paper we use partially ordered sets (posets) to study decentralized control problems arising in different settings. We show that time delayed systems with certain dela...
Parikshit Shah, Pablo A. Parrilo