Sciweavers

1048 search results - page 167 / 210
» Framework Design for End-to-End Optimization
Sort
View
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
15 years 4 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
ESA
2007
Springer
125views Algorithms» more  ESA 2007»
15 years 4 months ago
Online Primal-Dual Algorithms for Maximizing Ad-Auctions Revenue
We study the online ad-auctions problem introduced by Mehta et. al. [15]. We design a (1 − 1/e)competitive (optimal) algorithm for the problem, which is based on a clean primal-...
Niv Buchbinder, Kamal Jain, Joseph Naor
SIGIR
2006
ACM
15 years 4 months ago
Learning to advertise
Content-targeted advertising, the task of automatically associating ads to a Web page, constitutes a key Web monetization strategy nowadays. Further, it introduces new challenging...
Anísio Lacerda, Marco Cristo, Marcos Andr&e...
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
15 years 3 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang