Sciweavers

5153 search results - page 783 / 1031
» Introduction to Randomized Algorithms
Sort
View
124
Voted
SAS
2004
Springer
140views Formal Methods» more  SAS 2004»
15 years 9 months ago
Path-Sensitive Analysis for Linear Arithmetic and Uninterpreted Functions
We describe data structures and algorithms for performing a path-sensitive program analysis to discover equivalences of expressions involving linear arithmetic or uninterpreted fun...
Sumit Gulwani, George C. Necula
158
Voted
VLDB
2004
ACM
134views Database» more  VLDB 2004»
15 years 9 months ago
Memory-Limited Execution of Windowed Stream Joins
We address the problem of computing approximate answers to continuous sliding-window joins over data streams when the available memory may be insufficient to keep the entire join...
Utkarsh Srivastava, Jennifer Widom
144
Voted
ICDM
2003
IEEE
240views Data Mining» more  ICDM 2003»
15 years 9 months ago
Clustering of Time Series Subsequences is Meaningless: Implications for Previous and Future Research
Given the recent explosion of interest in streaming data and online algorithms, clustering of time series subsequences, extracted via a sliding window, has received much attention...
Eamonn J. Keogh, Jessica Lin, Wagner Truppel
144
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Dynamic Power Allocation and Routing for Time Varying Wireless Networks
—We consider dynamic routing and power allocation for a wireless network with time-varying channels. The network consists of power constrained nodes that transmit over wireless l...
Michael J. Neely, Eytan Modiano, Charles E. Rohrs
138
Voted
ISCAS
2003
IEEE
114views Hardware» more  ISCAS 2003»
15 years 9 months ago
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new en...
Nicolas Sklavos, Odysseas G. Koufopavlou