Sciweavers

1080 search results - page 173 / 216
» Distributed Hash Tables
Sort
View
127
Voted
IJAR
2007
55views more  IJAR 2007»
15 years 4 months ago
Theoretical analysis and practical insights on importance sampling in Bayesian networks
The AIS-BN algorithm [2] is a successful importance sampling-based algorithm for Bayesian networks that relies on two heuristic methods to obtain an initial importance function: -...
Changhe Yuan, Marek J. Druzdzel
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
17 years 4 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...
IPPS
2008
IEEE
15 years 11 months ago
Random choices for churn resilient load balancing in peer-to-peer networks
Peer-to-peer (P2P) networks based on consistent hashing functions have an inherent load uneven distribution problem. Things are even worse in unstructured P2P systems. The objecti...
Song Fu, Cheng-Zhong Xu, Haiying Shen
INFOCOM
2003
IEEE
15 years 10 months ago
Modeling Peer-Peer File Sharing Systems
— Peer-peer networking has recently emerged as a new paradigm for building distributed networked applications. In this paper we develop simple mathematical models to explore and ...
Zihui Ge, Daniel R. Figueiredo, Sharad Jaiswal, Ja...
VLDB
2005
ACM
149views Database» more  VLDB 2005»
16 years 5 months ago
Selectivity estimators for multidimensional range queries over real attributes
Estimating the selectivity of multidimensional range queries over real valued attributes has significant applications in data exploration and database query optimization. In this p...
Dimitrios Gunopulos, George Kollios, Vassilis J. T...