Sciweavers

19 search results - page 2 / 4
» Weak and exact domination in distributed systems
Sort
View
QEST
2006
IEEE
15 years 3 months ago
Measuring and Modeling of Application Flow Length in Commercial GPRS Networks
New mobile access networks provide reasonable high bandwidth to allow true internet access. This paper models two dominant applications of those networks. One application, WAP, is...
Roger Kalden, Boudewijn R. Haverkort
IAT
2009
IEEE
15 years 1 months ago
Efficient Distributed Bayesian Reasoning via Targeted Instantiation of Variables
Abstract--This paper is focusing on exact Bayesian reasoning in systems of agents, which represent weakly coupled processing modules supporting collaborative inference through mess...
Patrick de Oude, Gregor Pavlin
IFIP
2005
Springer
15 years 3 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
KIVS
2005
Springer
15 years 3 months ago
Caching for Improved Retrieval in Peer-to-Peer Networks
: In modern information systems the dominant retrieval paradigms have shifted from exact matching towards retrieving a list of the most relevant objects. This is because users usua...
Wolf-Tilo Balke, Wolfgang Nejdl, Wolf Siberski, Uw...
CIKM
2009
Springer
15 years 4 months ago
Evaluating top-k queries over incomplete data streams
We study the problem of continuous monitoring of top-k queries over multiple non-synchronized streams. Assuming a sliding window model, this general problem has been a well addres...
Parisa Haghani, Sebastian Michel, Karl Aberer