Sciweavers

3356 search results - page 170 / 672
» Thresholds and Expectation Thresholds
Sort
View
ICDCS
2010
IEEE
15 years 4 months ago
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary
—There are several analytical results on distributed hash tables (DHTs) that can tolerate Byzantine faults. Unfortunately, in such systems, operations such as data retrieval and ...
Maxwell Young, Aniket Kate, Ian Goldberg, Martin K...
118
Voted
TWC
2008
113views more  TWC 2008»
15 years 19 days ago
Capacity of opportunistic routing in multi-rate and multi-hop wireless networks
Abstract-- Opportunistic routing (OR) copes with the unreliable transmissions by exploiting the broadcast nature of the wireless medium and spatial diversity of the multi-hop wirel...
Kai Zeng, Wenjing Lou, Hongqiang Zhai
INFOCOM
2011
IEEE
14 years 4 months ago
Risk sensitive optimal control framework applied to delay tolerant networks
—Epidemics dynamics can describe the dissemination of information in delay tolerant networks, in peer to peer networks and in content delivery networks. The control of such dynam...
Eitan Altman, Veeraruna Kavitha, Francesco De Pell...
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
16 years 27 days ago
Wavelet synopses with error guarantees
Recent work has demonstrated the effectiveness of the wavelet decomposition in reducing large amounts of data to compact sets of wavelet coefficients (termed "wavelet synopse...
Minos N. Garofalakis, Phillip B. Gibbons
131
Voted
WWW
2010
ACM
15 years 7 months ago
Inferring relevant social networks from interpersonal communication
Researchers increasingly use electronic communication data to construct and study large social networks, effectively inferring unobserved ties (e.g. i is connected to j) from obs...
Munmun De Choudhury, Winter A. Mason, Jake M. Hofm...