Sciweavers

2978 search results - page 187 / 596
» Operations Research
Sort
View
136
Voted
SIGMOD
1999
ACM
135views Database» more  SIGMOD 1999»
15 years 8 months ago
Improving OLTP Data Quality Using Data Warehouse Mechanisms
Research and products for the integration of heterogeneous legacy source databases in data warehousing have addressed numerous data quality problems in or between the sources. Suc...
Matthias Jarke, Christoph Quix, Guido Blees, Dirk ...
120
Voted
EENERGY
2010
15 years 7 months ago
Event-driven processor power management
Energy-efficient computing as a research area has been receiving increasing attention in recent years due to rising energy costs and environmental awareness. In this paper, we pre...
Jan Hendrik Schönherr, Jan Richling, Matthias...
131
Voted
HOTOS
2009
IEEE
15 years 7 months ago
FlashVM: Revisiting the Virtual Memory Hierarchy
Flash memory is the largest change to storage in recent history. To date, most research has focused on integrating flash as persistent storage in file systems, with little emphasi...
Mohit Saxena, Michael M. Swift
114
Voted
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
15 years 7 months ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith
149
Voted
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 7 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena