Sciweavers

7380 search results - page 1457 / 1476
» time 2008
Sort
View
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
15 years 1 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
SODA
2008
ACM
126views Algorithms» more  SODA 2008»
15 years 1 months ago
On distributing symmetric streaming computations
A common approach for dealing with large data sets is to stream over the input in one pass, and perform computations using sublinear resources. For truly massive data sets, howeve...
Jon Feldman, S. Muthukrishnan, Anastasios Sidiropo...
ASSETS
2008
ACM
15 years 27 days ago
Investigating sighted users' browsing behaviour to assist web accessibility
The rapid advancement of World Wide Web (Web) technology and constant need for attractive Websites produce pages that hinder visually impaired users. We assert that understanding ...
Eleni Michailidou, Simon Harper, Sean Bechhofer
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
15 years 27 days ago
Stability analysis of linear hyperbolic systems with switching parameters and boundary conditions
Abstract— We study asymptotic stability of an infinite dimensional system that switches between a finite set of modes. Each mode is governed by a system of one-dimensional, lin...
Saurabh Amin, Falk M. Hante, Alexandre M. Bayen
ESA
2010
Springer
207views Algorithms» more  ESA 2010»
15 years 27 days ago
Budgeted Red-Blue Median and Its Generalizations
In a Content Distribution Network application, we have a set of servers and a set of clients to be connected to the servers. Often there are a few server types and a hard budget co...
MohammadTaghi Hajiaghayi, Rohit Khandekar, Guy Kor...
« Prev « First page 1457 / 1476 Last » Next »