Results 1 - 10
of
137
Gossiping personalized queries
- EDBT, volume 426 of ACM International Conference Proceeding Series
, 2010
"... This paper presents P3Q, a fully decentralized gossip-based proto-col to personalize query processing in social tagging systems. P3Q dynamically associates each user with social acquaintances shar-ing similar tagging behaviours. Queries are gossiped among such acquaintances, computed on the fly in a ..."
Abstract
-
Cited by 14 (4 self)
- Add to MetaCart
in a collaborative, yet parti-tioned manner, and results are iteratively refined and returned to the querier. Analytical and experimental evaluations convey the scalability of P3Q for top-k query processing. More specifically, we show that on a 10,000-user delicious trace, with little storage at each
A case for integrated processor-cache partitioning in chip multiprocessors
- In Proceedings of the Conference on High-Performance Computing Networking, Storage and Analysis
, 2009
"... Existing cache partitioning schemes are designed in a man-ner oblivious to the implicit processor partitioning enforced by the operating system. This paper examines an oper-ating system directed integrated processor-cache partition-ing scheme that partitions both the available processors and the sha ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
also compare our approach to pro-cessor partitioning alone and a state-of-the-art cache parti-tioning scheme and our scheme fares 8.21 % and 9.19 % better than these schemes on a 16 core system. 1.
A Systematic Agent Framework for Situated Autonomous Systems
- In 9th AAMAS
, 2010
"... We present a formal framework of an autonomous agent as a collection of coordinated control loops, with a recurring sense, plan, act cycle. Our framework manages the informa-tion flow within the partitioned structure to ensure consis-tency in order to direct the flow of goals and observations in a t ..."
Abstract
-
Cited by 17 (9 self)
- Add to MetaCart
We present a formal framework of an autonomous agent as a collection of coordinated control loops, with a recurring sense, plan, act cycle. Our framework manages the informa-tion flow within the partitioned structure to ensure consis-tency in order to direct the flow of goals and observations in a
Synthetic mammalian trigger-controlled bipartite transcription factors
- Nucleic Acids Res
, 2013
"... Synthetic biology has significantly advanced the design of synthetic control devices, gene circuits and networks that can reprogram mammalian cells in a trigger-inducible manner. Prokaryotic helix-turn-helix motifs have become the standard resource to design synthetic mammalian transcrip-tion factor ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
Synthetic biology has significantly advanced the design of synthetic control devices, gene circuits and networks that can reprogram mammalian cells in a trigger-inducible manner. Prokaryotic helix-turn-helix motifs have become the standard resource to design synthetic mammalian transcrip-tion
Query-Aware Locality-Sensitive Hashing for Approximate Nearest Neighbor Search
"... Locality-Sensitive Hashing (LSH) and its variants are the well-known indexing schemes for the c-Approximate Nearest Neighbor (c-ANN) search problem in high-dimensional Eu-clidean space. Traditionally, LSH functions are constructed in a query-oblivious manner in the sense that buckets are partitioned ..."
Abstract
- Add to MetaCart
are partitioned before any query arrives. However, objects closer to a query may be partitioned into different buckets, which is undesirable. Due to the use of query-oblivious bucket parti-tion, the state-of-the-art LSH schemes for external memory, namely C2LSH and LSB-Forest, only work with approxima-tion ratio
Generalized non interactive oblivious transfer using count-limited objects with applications to secure mobile agents
- In Financial Cryptography
, 2008
"... Abstract. Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evalua-tion (SFE) protocols. However, interaction is a primary feature of any OT protocol. In this paper, we show how to remove the interaction require-ment in an OT p ..."
Abstract
-
Cited by 15 (5 self)
- Add to MetaCart
Abstract. Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evalua-tion (SFE) protocols. However, interaction is a primary feature of any OT protocol. In this paper, we show how to remove the interaction require-ment in an OT
Methods for mining web communities: Bibliometric, spectral, and flow. Web Dynamics - Adapting to Change in Content, Size, Topology and Use
, 2004
"... Summary. In this chapter, we examine the problem of Web community identifica-tion expressed in terms of the graph or network structure induced by the Web. While the task of community identification is obviously related to the more fundamental problems of graph partitioning and clustering, the basic ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
Summary. In this chapter, we examine the problem of Web community identifica-tion expressed in terms of the graph or network structure induced by the Web. While the task of community identification is obviously related to the more fundamental problems of graph partitioning and clustering, the basic
Towards Implementing Multi-Layer Reflection for Fault-Tolerance
- DSN’2003, The International Conference on Dependable Systems and Networks
, 2003
"... Th3r2 party software is now in reasingly used in systems with hhm dependability requirements. Thq evolution of system development raises new h czM55LcO in parti ular regarding thg implementation of faulttoleran e. As systems are often built of bla k-box omponents, some ru ial aspe ts of thczz beh ..."
Abstract
-
Cited by 11 (7 self)
- Add to MetaCart
aspe ts, among wh h fault-toleran e. In thcW paper we dis uss hs to apply refle tion to multi-layer systems for implementing faulttoleran e in an independent and prin ipled manner. We analyze thl onne tions between thw underlying assumptions of fault-toleran e strategies and different layers of a
Ad-Hoc Business Processes in Web Services
- In: Proceedings of the 2003 IEEE-Symposium on Applications and the Internet (SAINT). Workshop on Service Oriented Computing: Models, Architectures and Applications
, 2003
"... Web service technologies promise to facilitate collabora-tion among business partners by helping potential business partners find one another and integrate their business pro-cesses to do business. Daunting challenges however exist before the full potential of Web services can be realized. In-dexing ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Web service technologies promise to facilitate collabora-tion among business partners by helping potential business partners find one another and integrate their business pro-cesses to do business. Daunting challenges however exist before the full potential of Web services can be realized. In
Secure Computation Against Adaptive Auxiliary Information
"... Abstract. We study the problem of secure two-party and multiparty computation (MPC) in a setting where a cheating polynomial-time ad-versary can corrupt an arbitrary subset of parties and, in addition, learn arbitrary auxiliary information on the entire states of all honest par-ties (including their ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
auxiliary information. In particular, if the auxiliary information contains only partial, “noisy, ” or computa-tionally invertible information on secret inputs, then only such informa-tion should be revealed. We construct a universally composable AAI two-party and multiparty computation protocol
Results 1 - 10
of
137