Sciweavers

10909 search results - page 172 / 2182
» Evaluating Backup Algorithms
Sort
View
ISAAC
2007
Springer
135views Algorithms» more  ISAAC 2007»
15 years 10 months ago
Fast Evaluation of Union-Intersection Expressions
Abstract. We show how to represent sets in a linear space data structure such that expressions involving unions and intersections of sets can be computed in a worst-case efficient ...
Philip Bille, Anna Pagh, Rasmus Pagh
IPPS
2005
IEEE
15 years 9 months ago
Evaluation of Rate-Based Adaptivity in Asynchronous Data Stream Joins
Continuous query systems are an intuitive way for users to access streaming data in large-scale scientific applications containing many hundreds of streams. A challenge in these ...
Beth Plale, Nithya N. Vijayakumar
RTAS
2005
IEEE
15 years 9 months ago
VPN Gateways over Network Processors: Implementation and Evaluation
Networking applications, such as VPN and content filtering, demand extra computing power in order to meet the throughput requirement nowadays. In addition to pure ASIC solutions, ...
Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-C...
CIKM
2004
Springer
15 years 9 months ago
Evaluating window joins over punctuated streams
We explore join optimizations in the presence of both timebased constraints (sliding windows) and value-based constraints (punctuations). We present the first join solution named...
Luping Ding, Elke A. Rundensteiner
ISCC
2003
IEEE
130views Communications» more  ISCC 2003»
15 years 9 months ago
Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation
Perfect Secrecy can only be achieved in multicast groups by ciphering data sent to the group with a different key every time a member joins or leaves the group. A Key Server must ...
Josep Pegueroles, Francisco Rico-Novella