Sciweavers

646 search results - page 115 / 130
» Generalized efficiency bounds in distributed resource alloca...
Sort
View
119
Voted
SAC
2008
ACM
15 years 1 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
AMKM
2003
Springer
15 years 7 months ago
Integrating External Sources in a Corporate Semantic Web Managed by a Multi-agent System
We first describe a multi-agent system managing a corporate memory in the form of a corporate semantic web. We then focus on a newly introduced society of agents in charge of wrap...
Tuan-Dung Cao, Fabien Gandon
KDD
2007
ACM
153views Data Mining» more  KDD 2007»
16 years 2 months ago
Exploiting duality in summarization with deterministic guarantees
Summarization is an important task in data mining. A major challenge over the past years has been the efficient construction of fixed-space synopses that provide a deterministic q...
Panagiotis Karras, Dimitris Sacharidis, Nikos Mamo...
ITIIS
2008
151views more  ITIIS 2008»
15 years 1 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
VLDB
1997
ACM
97views Database» more  VLDB 1997»
15 years 6 months ago
The Complexity of Transformation-Based Join Enumeration
Query optimizers that explore a search space exhaustively using transformation rules usually apply all possible rules on each alternative, and stop when no new information is prod...
Arjan Pellenkoft, César A. Galindo-Legaria,...