Sciweavers

5344 search results - page 197 / 1069
» Privacy-Preserving Set Operations
Sort
View
126
Voted
HOTOS
2007
IEEE
15 years 7 months ago
Don't Settle for Less Than the Best: Use Optimization to Make Decisions
Many systems design, configuration, runtime and management decisions must be made from a large set of possible alternatives. Ad hoc heuristics have traditionally been used to make...
Kimberly Keeton, Terence Kelly, Arif Merchant, Cip...
138
Voted
DSN
2006
IEEE
15 years 7 months ago
Empirical and Analytical Evaluation of Systems with Multiple Unreliable Servers
We construct, analyze and solve models of systems where a number of servers offer services to an incoming stream of demands. Each server goes through alternating periods of being ...
Jennie Palmer, Isi Mitrani
121
Voted
POS
2000
Springer
15 years 7 months ago
Hyper-Code Revisited: Unifying Program Source, Executable, and Data
Abstract. The technique of hyper-programming allows program representations held in a persistent store to contain embedded links to persistent code and data. In 1994, Connor et al ...
Evangelos Zirintsis, Graham N. C. Kirby, Ronald Mo...
119
Voted
VLDB
1987
ACM
106views Database» more  VLDB 1987»
15 years 7 months ago
A Dual Space Representation for Geometric Data
Thie paper presents a representation echeme for polyhedral objects in arbitrary dimensions. Each object ie represented as the algebraic sum of convex polyhedra (cells). Each cell ...
Oliver Günther, Eugene Wong
116
Voted
DAGSTUHL
2007
15 years 5 months ago
Two-Dimensional Belief Change
ABSTRACT: In this paper I present the model of ‘bounded revision’ that is based on two-dimensional revision functions taking as arguments pairs consisting of an input sentence ...
Hans Rott