Sciweavers

3257 search results - page 628 / 652
» networking 2004
Sort
View
STOC
2004
ACM
150views Algorithms» more  STOC 2004»
15 years 10 months ago
Typical properties of winners and losers in discrete optimization
We present a probabilistic analysis for a large class of combinatorial optimization problems containing, e.g., all binary optimization problems defined by linear constraints and a...
René Beier, Berthold Vöcking
VLDB
2004
ACM
112views Database» more  VLDB 2004»
15 years 10 months ago
Tracking set-expression cardinalities over continuous update streams
There is growing interest in algorithms for processing and querying continuous data streams (i.e., data that is seen only once in a fixed order) with limited memory resources. In i...
Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastog...
SIGMOD
2004
ACM
130views Database» more  SIGMOD 2004»
15 years 10 months ago
Semantically Enriched Web Services for the Travel Industry
Today, the travel information services are dominantly provided by Global Distribution Systems (GDS). The Global Distribution Systems provide access to real time availability and p...
Asuman Dogac, Yildiray Kabak, Gokce Laleci, Siyame...
SIGMOD
2004
ACM
151views Database» more  SIGMOD 2004»
15 years 10 months ago
Highly-Available, Fault-Tolerant, Parallel Dataflows
We present a technique that masks failures in a cluster to provide high availability and fault-tolerance for long-running, parallelized dataflows. We can use these dataflows to im...
Mehul A. Shah, Joseph M. Hellerstein, Eric A. Brew...
CCS
2009
ACM
15 years 4 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...