Sciweavers

5344 search results - page 991 / 1069
» Privacy-Preserving Set Operations
Sort
View
IWQOS
2004
Springer
15 years 7 months ago
Service availability: a new approach to characterize IP backbone topologies
— Traditional SLAs, defined by average delay or packet loss, often camouflage the instantaneous performance perceived by end-users. We define a set of metrics for service avai...
Ram Keralapura, Chen-Nee Chuah, Gianluca Iannaccon...
KDD
2004
ACM
147views Data Mining» more  KDD 2004»
15 years 7 months ago
Clustering time series from ARMA models with clipped data
Clustering time series is a problem that has applications in a wide variety of fields, and has recently attracted a large amount of research. In this paper we focus on clustering...
Anthony J. Bagnall, Gareth J. Janacek
LCTRTS
2004
Springer
15 years 7 months ago
Finding effective compilation sequences
Most modern compilers operate by applying a fixed, program-independent sequence of optimizations to all programs. Compiler writers choose a single “compilation sequence”, or ...
L. Almagor, Keith D. Cooper, Alexander Grosul, Tim...
PAM
2004
Springer
15 years 7 months ago
Measurements and Laboratory Simulations of the Upper DNS Hierarchy
Given that the global DNS system, especially at the higher root and top-levels, experiences significant query loads, we seek to answer the following questions: (1) How does the ch...
Duane Wessels, Marina Fomenkov, Nevil Brownlee, Ki...
115
Voted
VLDB
2004
ACM
124views Database» more  VLDB 2004»
15 years 7 months ago
Automated Statistics Collection in DB2 UDB
The use of inaccurate or outdated database statistics by the query optimizer in a relational DBMS often results in a poor choice of query execution plans and hence unacceptably lo...
Ashraf Aboulnaga, Peter J. Haas, Sam Lightstone, G...