• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 137
Next 10 →

Gossiping personalized queries

by Xiao Bai, Marin Bertier, Rachid Guerraoui, Anne-marie Kermarrec - EDBT, volume 426 of ACM International Conference Proceeding Series , 2010
"... This paper presents P3Q, a fully decentralized gossip-based proto-col to personalize query processing in social tagging systems. P3Q dynamically associates each user with social acquaintances shar-ing similar tagging behaviours. Queries are gossiped among such acquaintances, computed on the fly in a ..."
Abstract - Cited by 14 (4 self) - Add to MetaCart
in a collaborative, yet parti-tioned manner, and results are iteratively refined and returned to the querier. Analytical and experimental evaluations convey the scalability of P3Q for top-k query processing. More specifically, we show that on a 10,000-user delicious trace, with little storage at each

A case for integrated processor-cache partitioning in chip multiprocessors

by Shekhar Srikantaiah, Reetuparna Das, Asit K. Mishra, Chita R. Das, Mahmut K - In Proceedings of the Conference on High-Performance Computing Networking, Storage and Analysis , 2009
"... Existing cache partitioning schemes are designed in a man-ner oblivious to the implicit processor partitioning enforced by the operating system. This paper examines an oper-ating system directed integrated processor-cache partition-ing scheme that partitions both the available processors and the sha ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
also compare our approach to pro-cessor partitioning alone and a state-of-the-art cache parti-tioning scheme and our scheme fares 8.21 % and 9.19 % better than these schemes on a 16 core system. 1.

A Systematic Agent Framework for Situated Autonomous Systems

by Frédéric Py, Kanna Rajan, Conor Mcgann - In 9th AAMAS , 2010
"... We present a formal framework of an autonomous agent as a collection of coordinated control loops, with a recurring sense, plan, act cycle. Our framework manages the informa-tion flow within the partitioned structure to ensure consis-tency in order to direct the flow of goals and observations in a t ..."
Abstract - Cited by 17 (9 self) - Add to MetaCart
We present a formal framework of an autonomous agent as a collection of coordinated control loops, with a recurring sense, plan, act cycle. Our framework manages the informa-tion flow within the partitioned structure to ensure consis-tency in order to direct the flow of goals and observations in a

Synthetic mammalian trigger-controlled bipartite transcription factors

by Marc Folcher, Mingqi Xie, Andrea Spinnler, Martin Fussenegger - Nucleic Acids Res , 2013
"... Synthetic biology has significantly advanced the design of synthetic control devices, gene circuits and networks that can reprogram mammalian cells in a trigger-inducible manner. Prokaryotic helix-turn-helix motifs have become the standard resource to design synthetic mammalian transcrip-tion factor ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
Synthetic biology has significantly advanced the design of synthetic control devices, gene circuits and networks that can reprogram mammalian cells in a trigger-inducible manner. Prokaryotic helix-turn-helix motifs have become the standard resource to design synthetic mammalian transcrip-tion

Query-Aware Locality-Sensitive Hashing for Approximate Nearest Neighbor Search

by Qiang Huang, Jianlin Feng, Yikai Zhang, Qiong Fang, Wilfred Ng
"... Locality-Sensitive Hashing (LSH) and its variants are the well-known indexing schemes for the c-Approximate Nearest Neighbor (c-ANN) search problem in high-dimensional Eu-clidean space. Traditionally, LSH functions are constructed in a query-oblivious manner in the sense that buckets are partitioned ..."
Abstract - Add to MetaCart
are partitioned before any query arrives. However, objects closer to a query may be partitioned into different buckets, which is undesirable. Due to the use of query-oblivious bucket parti-tion, the state-of-the-art LSH schemes for external memory, namely C2LSH and LSB-Forest, only work with approxima-tion ratio

Generalized non interactive oblivious transfer using count-limited objects with applications to secure mobile agents

by Ana Gunupudi, Stephen R. Tate - In Financial Cryptography , 2008
"... Abstract. Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evalua-tion (SFE) protocols. However, interaction is a primary feature of any OT protocol. In this paper, we show how to remove the interaction require-ment in an OT p ..."
Abstract - Cited by 15 (5 self) - Add to MetaCart
Abstract. Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evalua-tion (SFE) protocols. However, interaction is a primary feature of any OT protocol. In this paper, we show how to remove the interaction require-ment in an OT

Methods for mining web communities: Bibliometric, spectral, and flow. Web Dynamics - Adapting to Change in Content, Size, Topology and Use

by Gary William Flake, Kostas Tsioutsiouliklis, Leonid Zhukov , 2004
"... Summary. In this chapter, we examine the problem of Web community identifica-tion expressed in terms of the graph or network structure induced by the Web. While the task of community identification is obviously related to the more fundamental problems of graph partitioning and clustering, the basic ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Summary. In this chapter, we examine the problem of Web community identifica-tion expressed in terms of the graph or network structure induced by the Web. While the task of community identification is obviously related to the more fundamental problems of graph partitioning and clustering, the basic

Towards Implementing Multi-Layer Reflection for Fault-Tolerance

by Francois Taiani, François Taïani, Jean-charles Fabre, Jean-charles Fabre, Marco-Olivier Killijian, Marc-olivier Killijian - DSN’2003, The International Conference on Dependable Systems and Networks , 2003
"... Th3r2 party software is now in reasingly used in systems with hhm dependability requirements. Thq evolution of system development raises new h czM55LcO in parti ular regarding thg implementation of faulttoleran e. As systems are often built of bla k-box omponents, some ru ial aspe ts of thczz beh ..."
Abstract - Cited by 11 (7 self) - Add to MetaCart
aspe ts, among wh h fault-toleran e. In thcW paper we dis uss hs to apply refle tion to multi-layer systems for implementing faulttoleran e in an independent and prin ipled manner. We analyze thl onne tions between thw underlying assumptions of fault-toleran e strategies and different layers of a

Ad-Hoc Business Processes in Web Services

by Andreas Wombacher, Bendick Mahleko - In: Proceedings of the 2003 IEEE-Symposium on Applications and the Internet (SAINT). Workshop on Service Oriented Computing: Models, Architectures and Applications , 2003
"... Web service technologies promise to facilitate collabora-tion among business partners by helping potential business partners find one another and integrate their business pro-cesses to do business. Daunting challenges however exist before the full potential of Web services can be realized. In-dexing ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Web service technologies promise to facilitate collabora-tion among business partners by helping potential business partners find one another and integrate their business pro-cesses to do business. Daunting challenges however exist before the full potential of Web services can be realized. In

Secure Computation Against Adaptive Auxiliary Information

by Elette Boyle, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai
"... Abstract. We study the problem of secure two-party and multiparty computation (MPC) in a setting where a cheating polynomial-time ad-versary can corrupt an arbitrary subset of parties and, in addition, learn arbitrary auxiliary information on the entire states of all honest par-ties (including their ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
auxiliary information. In particular, if the auxiliary information contains only partial, “noisy, ” or computa-tionally invertible information on secret inputs, then only such informa-tion should be revealed. We construct a universally composable AAI two-party and multiparty computation protocol
Next 10 →
Results 1 - 10 of 137
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University