Sciweavers

193 search results - page 21 / 39
» Join Reordering by Join Simulation
Sort
View
OSDI
2000
ACM
15 years 14 days ago
Overcast: Reliable Multicasting with an Overlay Network
Overcast is an application-level multicasting system that can be incrementally deployed using today's Internet infrastructure. These properties stem from Overcast's impl...
John Jannotti, David K. Gifford, Kirk L. Johnson, ...

Publication
145views
14 years 7 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
98
Voted
TWC
2010
14 years 5 months ago
Clustering and cluster-based routing protocol for delay-tolerant mobile networks
This research investigates distributed clustering scheme and proposes a cluster-based routing protocol for DelayTolerant Mobile Networks (DTMNs). The basic idea is to distributivel...
Ha Dang, Hongyi Wu
188
Voted
ICDE
2006
IEEE
119views Database» more  ICDE 2006»
16 years 14 days ago
Laws for Rewriting Queries Containing Division Operators
Relational division, also known as small divide, is a derived operator of the relational algebra that realizes a many-to-one set containment test, where a set is represented as a ...
Ralf Rantzau, Christoph Mangold
ADBIS
2009
Springer
127views Database» more  ADBIS 2009»
15 years 5 months ago
Window Update Patterns in Stream Operators
Continuous queries applied over nonterminating data streams usually specify windows in order to obtain an evolving –yet restricted– set of tuples and thus provide timely result...
Kostas Patroumpas, Timos K. Sellis