Sciweavers

983 search results - page 129 / 197
» Mathematics Computing Environment on the Web
Sort
View
JSSPP
2005
Springer
15 years 10 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
PODC
2003
ACM
15 years 9 months ago
Split-ordered lists: lock-free extensible hash tables
We present the first lock-free implementation of an extensible hash table running on current architectures. Our algorithm provides concurrent insert, delete, and find operations ...
Ori Shalev, Nir Shavit
EDBT
2009
ACM
173views Database» more  EDBT 2009»
15 years 9 months ago
PROUD: a probabilistic approach to processing similarity queries over uncertain data streams
We present PROUD - A PRObabilistic approach to processing similarity queries over Uncertain Data streams, where the data streams here are mainly time series streams. In contrast t...
Mi-Yen Yeh, Kun-Lung Wu, Philip S. Yu, Ming-Syan C...
MMMACNS
2001
Springer
15 years 9 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
SIGMETRICS
2000
ACM
15 years 8 months ago
TCP in presence of bursty losses
In this paper we analyze the performance of a TCP-like flow control in a lossy environment. The transmission rate in the control scheme that we consider has a linear growth rate;...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...