Sciweavers

7380 search results - page 1457 / 1476
» time 2008
Sort
View
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
14 years 11 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
SODA
2008
ACM
126views Algorithms» more  SODA 2008»
14 years 11 months ago
On distributing symmetric streaming computations
A common approach for dealing with large data sets is to stream over the input in one pass, and perform computations using sublinear resources. For truly massive data sets, howeve...
Jon Feldman, S. Muthukrishnan, Anastasios Sidiropo...
83
Voted
ASSETS
2008
ACM
14 years 10 months ago
Investigating sighted users' browsing behaviour to assist web accessibility
The rapid advancement of World Wide Web (Web) technology and constant need for attractive Websites produce pages that hinder visually impaired users. We assert that understanding ...
Eleni Michailidou, Simon Harper, Sean Bechhofer
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
14 years 10 months ago
Stability analysis of linear hyperbolic systems with switching parameters and boundary conditions
Abstract— We study asymptotic stability of an infinite dimensional system that switches between a finite set of modes. Each mode is governed by a system of one-dimensional, lin...
Saurabh Amin, Falk M. Hante, Alexandre M. Bayen
ESA
2010
Springer
207views Algorithms» more  ESA 2010»
14 years 10 months ago
Budgeted Red-Blue Median and Its Generalizations
In a Content Distribution Network application, we have a set of servers and a set of clients to be connected to the servers. Often there are a few server types and a hard budget co...
MohammadTaghi Hajiaghayi, Rohit Khandekar, Guy Kor...
« Prev « First page 1457 / 1476 Last » Next »