Sciweavers

7811 search results - page 1403 / 1563
» computing 2004
Sort
View
SAC
2004
ACM
15 years 8 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman
BIRTHDAY
2004
Springer
15 years 8 months ago
Psychologische Theorien sind Information-Retrieval-Verfahren
Psychological models of learning, forgetting, and memory processes are presented. These models describe human information processing as the formation and retrieval of associations...
Manfred Wettler
PODC
2004
ACM
15 years 8 months ago
Balanced binary trees for ID management and load balance in distributed hash tables
We present a low-cost, decentralized algorithm for ID management in distributed hash tables (DHTs) managed by a dynamic set of hosts. Each host is assigned an ID in the unit inter...
Gurmeet Singh Manku
SPAA
2004
ACM
15 years 8 months ago
On achieving optimized capacity utilization in application overlay networks with multiple competing sessions
In this paper, we examine the problem of large-volume data dissemination via overlay networks. A natural way to maximize the throughput of an overlay multicast session is to split...
Yi Cui, Baochun Li, Klara Nahrstedt
COORDINATION
2004
Springer
15 years 8 months ago
Active Coordination in Ad Hoc Networks
The increasing ubiquity of mobile devices has led to an explosion in the development of applications tailored to the particular needs of individual users. As the research communit...
Christine Julien, Gruia-Catalin Roman
« Prev « First page 1403 / 1563 Last » Next »