Sciweavers

6047 search results - page 1105 / 1210
» Modeling with Extend
Sort
View
126
Voted
STOC
2007
ACM
140views Algorithms» more  STOC 2007»
16 years 3 months ago
On the submodularity of influence in social networks
We prove and extend a conjecture of Kempe, Kleinberg, and Tardos (KKT) on the spread of influence in social networks. A social network can be represented by a directed graph where...
Elchanan Mossel, Sébastien Roch
STOC
2004
ACM
153views Algorithms» more  STOC 2004»
16 years 3 months ago
Bounded-concurrent secure multi-party computation with a dishonest majority
We show how to securely realize any multi-party functionality in a way that preserves security under an a-priori bounded number of concurrent executions, regardless of the number ...
Rafael Pass
SIGMOD
2004
ACM
163views Database» more  SIGMOD 2004»
16 years 3 months ago
Rank-aware Query Optimization
Ranking is an important property that needs to be fully supported by current relational query engines. Recently, several rank-join query operators have been proposed based on rank...
Ihab F. Ilyas, Rahul Shah, Walid G. Aref, Jeffrey ...
143
Voted
SIGMOD
2001
ACM
134views Database» more  SIGMOD 2001»
16 years 3 months ago
Preservation of Digital Data with Self-Validating, Self-Instantiating Knowledge-Based Archives
Digital archives are dedicated to the long-term preservation of electronic information and have the mandate to enable sustained access despite rapid technology changes. Persistent...
Bertram Ludäscher, Richard Marciano, Reagan Moore
137
Voted
MOBISYS
2008
ACM
16 years 2 months ago
Sixthsense: rfid-based enterprise intelligence
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
« Prev « First page 1105 / 1210 Last » Next »