Sciweavers

1781 search results - page 310 / 357
» Distributed Computer Vision Algorithms Through Distributed A...
Sort
View
AMW
2010
14 years 11 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
CIDR
2011
274views Algorithms» more  CIDR 2011»
14 years 1 months ago
Cloud Resource Orchestration: A Data-Centric Approach
Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infras...
Yun Mao, Changbin Liu, Jacobus E. van der Merwe, M...
EUROPAR
2003
Springer
15 years 2 months ago
Preventive Multi-master Replication in a Cluster of Autonomous Databases
We consider the use of a cluster of PC servers for Application Service Providers where applications and databases must remain autonomous. We use data replication to improve data av...
Esther Pacitti, M. Tamer Özsu, Cédric ...
IM
2007
14 years 9 months ago
In-Degree and PageRank: Why Do They Follow Similar Power Laws?
PageRank is a popularity measure designed by Google to rank Web pages. Experiments confirm that PageRank values obey a power law with the same exponent as In-Degree values. This ...
Nelly Litvak, Werner R. W. Scheinhardt, Yana Volko...
ATAL
2010
Springer
14 years 10 months ago
Path disruption games
We propose Path Disruption Games (PDGs), which consider collaboration between agents attempting stop an adversary from travelling from a source node to a target node in a graph. P...
Yoram Bachrach, Ely Porat