Streaming algorithm

Results: 106



#Item
41au  Aarhus University ANNUAL REPORT 2008

au Aarhus University ANNUAL REPORT 2008

Add to Reading List

Source URL: madalgo.au.dk

Language: English - Date: 2014-01-20 05:49:11
42Thesis for the degree  ‫עבודת גמר (תזה) לתואר‬ Master of Science

Thesis for the degree ‫עבודת גמר (תזה) לתואר‬ Master of Science

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2015-01-22 08:25:27
43au  AARHUS UNIVERSITY ANNUAL REPORT 2012

au AARHUS UNIVERSITY ANNUAL REPORT 2012

Add to Reading List

Source URL: madalgo.au.dk

Language: English - Date: 2014-01-20 05:49:08
44Enhancing Video Streaming Delivery over Wired/Wireless Networks Panagiotis Papadimitriou, Vassilis Tsaoussidis, and Chi Zhang Abstract—Delivering streaming video over wired/wireless networks is challenging, since link

Enhancing Video Streaming Delivery over Wired/Wireless Networks Panagiotis Papadimitriou, Vassilis Tsaoussidis, and Chi Zhang Abstract—Delivering streaming video over wired/wireless networks is challenging, since link

Add to Reading List

Source URL: www.intersys-lab.org

Language: English - Date: 2010-04-26 14:43:40
45References for the “Algorithmic High Dimensional Geometry” lectures at the Big Data Boot Camp, Simons Institute, Berkeley Alexandr Andoni Microsoft Research SVC September 4, 2013

References for the “Algorithmic High Dimensional Geometry” lectures at the Big Data Boot Camp, Simons Institute, Berkeley Alexandr Andoni Microsoft Research SVC September 4, 2013

Add to Reading List

Source URL: www.mit.edu

Language: English - Date: 2013-09-12 03:13:30
46Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams? T-H. Hubert Chan, Mingfei Li, Elaine Shi?? , and Wenchang Xu Abstract. We consider applications scenarios where an untrusted aggregat

Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams? T-H. Hubert Chan, Mingfei Li, Elaine Shi?? , and Wenchang Xu Abstract. We consider applications scenarios where an untrusted aggregat

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2012-04-24 08:47:00
47NOVELL CERTIFIED PROFESSIONAL Laura Chappell Inside the TCP Handshake Editor’s Note: For more information about network analysis techniques and uses, attend Laura Chappell’s “Introduction to Network Analysis” (se

NOVELL CERTIFIED PROFESSIONAL Laura Chappell Inside the TCP Handshake Editor’s Note: For more information about network analysis techniques and uses, attend Laura Chappell’s “Introduction to Network Analysis” (se

Add to Reading List

Source URL: www.novell.com

Language: English - Date: 2000-03-15 02:00:00
481  Performance Analysis of Quantization-based Approximation Algorithms for Precomputing the Supported QoS Ronghui Hou, King-Shan Lui, Ka-Cheong Leung, and Fred Baker

1 Performance Analysis of Quantization-based Approximation Algorithms for Precomputing the Supported QoS Ronghui Hou, King-Shan Lui, Ka-Cheong Leung, and Fred Baker

Add to Reading List

Source URL: www.eee.hku.hk

Language: English - Date: 2012-06-13 00:42:16
49Private and Continual Release of Statistics T-H. Hubert Chan1 , Elaine Shi2 , and Dawn Song3 1 The University of Hong Kong 2

Private and Continual Release of Statistics T-H. Hubert Chan1 , Elaine Shi2 , and Dawn Song3 1 The University of Hong Kong 2

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2010-05-17 01:15:04
50Microsoft PowerPoint - cormode1.ppt

Microsoft PowerPoint - cormode1.ppt

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2007-05-09 10:15:11