Sciweavers

648 search results - page 31 / 130
» Using Criticalities as a Heuristic for Answer Set Programmin...
Sort
View
SIGMOD
1999
ACM
101views Database» more  SIGMOD 1999»
15 years 5 months ago
Join Synopses for Approximate Query Answering
In large data warehousing environments, it is often advantageous to provide fast, approximate answers to complex aggregate queries based on statistical summaries of the full data....
Swarup Acharya, Phillip B. Gibbons, Viswanath Poos...
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 7 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
TON
2012
13 years 3 months ago
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
—Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vit...
Thang N. Dinh, Ying Xuan, My T. Thai, Panos M. Par...
AIR
2004
130views more  AIR 2004»
15 years 1 months ago
A Hybrid Framework for Over-Constrained Generalized
Abstract. In this work we study an over-constrained scheduling problem where constraints cannot be relaxed. This problem originates from a local defense agency where activities to ...
Andrew Lim, Brian Rodrigues, Ramesh Thangarajo, Fe...
CCGRID
2007
IEEE
15 years 7 months ago
Query-load balancing in structured overlays
Query-load (forwarding and answering) balancing in structured overlays is one of the most critical and least studied problems. It has been assumed that caching heuristics can take...
Anwitaman Datta, Roman Schmidt, Karl Aberer