Sciweavers

10909 search results - page 262 / 2182
» Evaluating Backup Algorithms
Sort
View
IWCMC
2006
ACM
15 years 10 months ago
What does using TCP as an evaluation tool reveal about MANET routing protocols?
Past research studying the operations of TCP over wireless/mobile ad hoc networks has shown that TCP cannot be adopted as-is for use in mobile ad hoc networks (MANET) to achieve r...
Sundaram Rajagopalan, Chien-Chung Shen
ECCC
2011
207views ECommerce» more  ECCC 2011»
14 years 11 months ago
Balls and Bins: Smaller Hash Families and Faster Evaluation
A fundamental fact in the analysis of randomized algorithm is that when n balls are hashed into n bins independently and uniformly at random, with high probability each bin contai...
L. Elisa Celis, Omer Reingold, Gil Segev, Udi Wied...
WWW
2009
ACM
16 years 5 months ago
Evaluating brand value on the web
The value of a brand name is an important factor that consumers often take into consideration when making their purchasing decisions. However, it is difficult for users to evaluat...
Takuya Kobayashi, Hiroaki Ohshima, Satoshi Oyama, ...
EDBT
2010
ACM
177views Database» more  EDBT 2010»
15 years 11 months ago
Bridging the gap between intensional and extensional query evaluation in probabilistic databases
There are two broad approaches to query evaluation over probabilistic databases: (1) Intensional Methods proceed by manipulating expressions over symbolic events associated with u...
Abhay Jha, Dan Olteanu, Dan Suciu
ICSM
2007
IEEE
15 years 11 months ago
Evaluation of Semantic Interference Detection in Parallel Changes: an Exploratory Experiment
Parallel developments are becoming increasingly prevalent in the building and evolution of large-scale software systems. Our previous studies of a large industrial project showed ...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry