Sciweavers

21520 search results - page 4219 / 4304
» Symmetric network computation
Sort
View
204
Voted
POPL
2008
ACM
16 years 25 days ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
201
Voted
POPL
2003
ACM
16 years 25 days ago
Bitwidth aware global register allocation
Multimedia and network processing applications make extensive use of subword data. Since registers are capable of holding a full data word, when a subword variable is assigned a r...
Sriraman Tallam, Rajiv Gupta
157
Voted
STOC
2007
ACM
239views Algorithms» more  STOC 2007»
16 years 25 days ago
Approximating minimum bounded degree spanning trees to within one of optimal
In the MINIMUM BOUNDED DEGREE SPANNING TREE problem, we are given an undirected graph with a degree upper bound Bv on each vertex v, and the task is to find a spanning tree of min...
Mohit Singh, Lap Chi Lau
110
Voted
ICALP
2009
Springer
16 years 25 days ago
Functional Monitoring without Monotonicity
The notion of distributed functional monitoring was recently introduced by Cormode, Muthukrishnan and Yi [CMY08] to initiate a formal study of the communication cost of certain fu...
Chrisil Arackaparambil, Joshua Brody, Amit Chakrab...
182
Voted
SIGMOD
2009
ACM
180views Database» more  SIGMOD 2009»
16 years 23 days ago
Indexing correlated probabilistic databases
With large amounts of correlated probabilistic data being generated in a wide range of application domains including sensor networks, information extraction, event detection etc.,...
Bhargav Kanagal, Amol Deshpande
« Prev « First page 4219 / 4304 Last » Next »