Sciweavers

1138 search results - page 183 / 228
» Talking about concerns
Sort
View
SAC
2008
ACM
15 years 13 days ago
Privacy-preserving link discovery
Abstract. Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interac...
Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R....
137
Voted
JAPLL
2010
104views more  JAPLL 2010»
14 years 11 months ago
Complete axiomatizations for XPath fragments
We provide complete axiomatizations for several fragments of XPath: sets of equivalences from which every other valid equivalence is derivable. Specifically, we axiomatize downwar...
Balder ten Cate, Tadeusz Litak, Maarten Marx
JSAC
2010
94views more  JSAC 2010»
14 years 11 months ago
LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System
During the last years several operators have expressed concerns about the continued growth of the BGP routing tables in the default-free zone. Proposed solutions for this issue ar...
Loránd Jakab, Albert Cabellos-Aparicio, Flo...
MANSCI
2010
106views more  MANSCI 2010»
14 years 11 months ago
Improving Supply Chain Performance and Managing Risk Under Weather-Related Demand Uncertainty
This paper considers a manufacturer-retailer supply chain for a seasonal product whose demand is weather-sensitive. The retailer orders from the manufacturer (supplier) prior to t...
Frank Youhua Chen, Candace Arai Yano
109
Voted
MICRO
2010
IEEE
153views Hardware» more  MICRO 2010»
14 years 11 months ago
AVF Stressmark: Towards an Automated Methodology for Bounding the Worst-Case Vulnerability to Soft Errors
Soft error reliability is increasingly becoming a first-order design concern for microprocessors, as a result of higher transistor counts, shrinking device geometries and lowering ...
Arun A. Nair, Lizy Kurian John, Lieven Eeckhout