Sciweavers

558 search results - page 30 / 112
» Safe and Effective Determinant Evaluation
Sort
View
CIKM
2006
Springer
15 years 3 months ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
NETWORKING
2007
15 years 1 months ago
Peer-Assisted On-Demand Streaming of Stored Media Using BitTorrent-Like Protocols
With BitTorrent-like protocols a client may download a file from a large and changing set of peers, using connections of heterogeneous and timevarying bandwidths. This flexibility ...
Niklas Carlsson, Derek L. Eager
USENIX
1996
15 years 1 months ago
A Comparison of OS Extension Technologies
The current trend in operating systems research is to allow applications to dynamically extend the kernel to improve application performance or extend functionality, but the most ...
Christopher Small, Margo I. Seltzer
OOPSLA
2010
Springer
14 years 10 months ago
Back to the futures: incremental parallelization of existing sequential runtime systems
Many language implementations, particularly for high-level and scripting languages, are based on carefully honed runtime systems that have an internally sequential execution model...
James Swaine, Kevin Tew, Peter A. Dinda, Robert Br...
SIGMOD
2007
ACM
146views Database» more  SIGMOD 2007»
15 years 12 months ago
Distributed query evaluation with performance guarantees
Partial evaluation has recently proven an effective technique for evaluating Boolean XPath queries over a fragmented tree that is distributed over a number of sites. What left ope...
Gao Cong, Wenfei Fan, Anastasios Kementsietsidis