Sciweavers

2194 search results - page 231 / 439
» Improving HLRTA*( k )
Sort
View
WAOA
2007
Springer
126views Algorithms» more  WAOA 2007»
15 years 7 months ago
Better Bounds for Incremental Medians
In the incremental version of the well-known k-median problem the objective is to compute an incremental sequence of facility sets F1 ⊆ F2 ⊆ .... ⊆ Fn, where each Fk contain...
Marek Chrobak, Mathilde Hurand
IPPS
2006
IEEE
15 years 7 months ago
Lossless compression for large scale cluster logs
The growing computational and storage needs of several scientific applications mandate the deployment of extreme-scale parallel machines, such as IBM’s Blue Gene/L which can acc...
R. Balakrishnan, Ramendra K. Sahoo
IH
2005
Springer
15 years 7 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
FC
2004
Springer
88views Cryptology» more  FC 2004»
15 years 6 months ago
Mental Models of Computer Security
Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on t...
L. Jean Camp
VLDB
2004
ACM
73views Database» more  VLDB 2004»
15 years 6 months ago
Multi-objective Query Processing for Database Systems
Query processing in database systems has developed beyond mere exact matching of attribute values. Scoring database objects and retrieving only the top k matches or Pareto-optimal...
Wolf-Tilo Balke, Ulrich Güntzer