Search
Now showing items 131-140 of 195
Online Optimization Of RED Routers
(2011-04-25)
Plan Bouquets : An Exploratory Approach to Robust Query Processing
(2017-09-26)
Over the last four decades, relational database systems, with their mathematical basis in first-order logic, have provided a congenial and efficient environment to handle enterprise data during its entire life cycle of ...
Model-Checking Infinite-State Systems For Information Flow Security Properties
(2017-02-16)
Information flow properties are away of specifying security properties of systems ,dating back to the work of Goguen and Meseguer in the eighties. In this framework ,a system is modeled as having high-level (or confidential)events ...
New Approaches And Experimental Studies On - Alegebraic Attacks On Stream Ciphers
(2015-02-05)
Algebraic attacks constitute an effective class of cryptanalytic attacks which have come up recently. In algebraic attacks, the relations between the input, output and the key are expressed as a system of equations and ...
Automatic Data Allocation, Buffer Management And Data Movement For Multi-GPU Machines
(2017-05-24)
Multi-GPU machines are being increasingly used in high performance computing. These machines are being used both as standalone work stations to run computations on medium to large data sizes (tens of gigabytes) and as a ...
Multi-label Classification with Multiple Label Correlation Orders And Structures
(2018-06-18)
Multilabel classification has attracted much interest in recent times due to the wide applicability of the problem and the challenges involved in learning a classifier for multilabeled data. A crucial aspect of multilabel ...
Retweet Profiling - Study Dissemination of Twitter Messages
(2017-09-23)
Social media has become an important means of everyday communication. It is a mechanism for “sharing” and “resharing” of information. While social network platforms provide the means to users for resharing/reblogging (aka ...
Provable Methods for Non-negative Matrix Factorization
(2017-10-31)
Nonnegative matrix factorization (NMF) is an important data-analysis problem which concerns factoring a given d n matrix A with nonnegative entries into matrices B and C where B and C are d k and k n with nonnegative ...
Efficient Online Path Profiling
(2009-06-05)
Most dynamic program analysis techniques such as profile-driven compiler optimizations, software testing and runtime property checking infer program properties by profiling one or more executions of a program. Unfortunately, ...
Caching Techniques For Dynamic Web Servers
(2009-03-20)
Websites are shifting from static model to dynamic model, in order to deliver their users with dynamic, interactive, and personalized experiences. However, dynamic content generation comes at a cost – each request ...