Sciweavers

607 search results - page 71 / 122
» Unifying Exact Completions
Sort
View
RTDB
1996
131views more  RTDB 1996»
15 years 10 days ago
Value-cognizant Admission Control Strategies for Real-Time DBMS
We propose and evaluate an admission control paradigm for RTDBS, in which a transaction is submitted to the system as a pair of processes: a primary task, and a recovery block. Th...
Azer Bestavros, Sue Nagy
COMGEO
2010
ACM
14 years 11 months ago
An efficient algorithm for the stratification and triangulation of an algebraic surface
: We present a method to compute the exact topology of a real algebraic surface S, implicitly given by a polynomial f Q[x,y,z] of arbitrary total degree N. Additionally, our analy...
Eric Berberich, Michael Kerber, Michael Sagraloff
FGIT
2010
Springer
14 years 9 months ago
Improved Location Aided Cluster Based Routing Protocol for GPS Enabled Manets
Routing has been the main challenge for ad hoc networks due to dynamic topology as well as resource constraints. Completely GPS free as well as GPS scarce positioning systems for ...
S. Mangai, A. Tamilarasi
FOCS
2007
IEEE
15 years 5 months ago
On the Complexity of Nash Equilibria and Other Fixed Points (Extended Abstract)
d Abstract) Kousha Etessami LFCS, School of Informatics University of Edinburgh Mihalis Yannakakis Department of Computer Science Columbia University We reexamine what it means to...
Kousha Etessami, Mihalis Yannakakis
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 2 months ago
Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac
Abstract—Intra-session network coding is known to be vulnerable to pollution attacks. In this work, first, we introduce a novel homomorphic MAC scheme called SpaceMac, which all...
Anh Le, Athina Markopoulou