• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 726
Next 10 →

Internet Routing Instability

by Craig Labovitz, G. Robert Malan, Farnam Jahanian , 1997
"... This paper examines the network inter-domain routing information exchanged between backbone service providers at the major U.S. public Internet exchange points. Internet routing instability, or the rapid fluctuation of network reachability information, is an important problem currently facing the In ..."
Abstract - Cited by 345 (9 self) - Add to MetaCart
's public exchange points during a nine month period. We show that the volume of these routing updates is several orders of magnitude more than expected and that the majority of this routing information is redundant, or pathological. Furthermore, our analysis reveals several unexpected trends and ill

UniProt: the Universal Protein Knowledgebase

by Rolf Apweiler, Amos Bairoch, Cathy H. Wu, Winona C. Barker, Brigitte Boeckmann, Serenella Ferro, Elisabeth Gasteiger, Hongzhan Huang, Rodrigo Lopez, Michele Magrane, Maria J. Martin, Darren A. Natale, Claire O'Donovan, Nicole Redaschi, Lai-Su L. Yeh - NUCLEIC ACIDS RES , 2004
"... To provide the scientific community with a single, centralized, authoritative resource for protein sequences and functional information, the Swiss-Prot, TrEMBL and PIR protein database activities have united to form the Universal Protein Knowledgebase (UniProt) consortium. Our mission is to provide ..."
Abstract - Cited by 335 (27 self) - Add to MetaCart
with automated classification, annotation and extensive cross-references). For convenient sequence searches, UniProt also provides several non-redundant sequence databases. The UniProt NREF (UniRef) databases provide representative subsets of the knowledgebase suitable for efficient searching. The comprehensive

Redundant

by Anne Raich, Tamás Liszkai
"... Abstract. A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problems is exploited by applying an implicit redundant representation (IRR) genetic algorithm. The unbraced frame st ..."
Abstract - Add to MetaCart
Abstract. A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problems is exploited by applying an implicit redundant representation (IRR) genetic algorithm. The unbraced frame

A Novel Redundant Data Update Algorithm for Fault-Tolerant Server-less Video-on-Demand Systems

by T. K. Ho, Jack Y. B. Lee - Proc. 2003 High Performance & Large Scale Computing (HP&LSC) Conference
"... Abstract: Recently, a new server-less architecture is proposed for building low-cost yet scalable video streaming systems. In this architecture, video data are distributed among user hosts and these hosts cooperate to stream video data to one another. To improve reliability, data and capacity redund ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
redundancy are introduced to sustain node failures. However, the data placement as well as the redundant data in the system will need to be updated whenever new nodes join the system. This study is a first step in investigating the problem of updating redundant data when growing such a server-less system

A Transpositional Redundant Data Update Algorithm for Growing Server-less Video Streaming Systems

by T. K. Ho, Jack Y. B. Lee
"... Recently, a new server-less architecture is proposed for building low-cost yet scalable video streaming systems. In this architecture, video blocks are distributed among user hosts and these hosts cooperate to stream video blocks to one another. To improve reliability, data and capacity redundancy a ..."
Abstract - Add to MetaCart
are introduced to sustain node failures. However, the data placement as well as the redundant data in the system will need to be updated whenever new nodes join the system. Results show that the redundancy update overhead is very significant and even exceeds that in data reorganization. In this study, we present

PAPER An Iterative Decoding Method of Updating Redundant Likelihood

by unknown authors , 2005
"... Information SUMMARY This paper presents a novel decoding algorithm for turbo codes, in which the likelihood values for redundant parts are updated in order for those values to become more reliable. A criterion for updating the redundant likelihood values is proposed, which is based on the comparison ..."
Abstract - Add to MetaCart
Information SUMMARY This paper presents a novel decoding algorithm for turbo codes, in which the likelihood values for redundant parts are updated in order for those values to become more reliable. A criterion for updating the redundant likelihood values is proposed, which is based

A Normal Form for XML Documents

by Marcelo Arenas, Leonid Libkin
"... This paper takes a rst step towards the design and normalization theory for XML documents. We show that, like relational databases, XML documents may contain redundant information, and may be prone to update anomalies. Furthermore, such problems are caused by certain functional dependencies among p ..."
Abstract - Cited by 167 (8 self) - Add to MetaCart
This paper takes a rst step towards the design and normalization theory for XML documents. We show that, like relational databases, XML documents may contain redundant information, and may be prone to update anomalies. Furthermore, such problems are caused by certain functional dependencies among

AFRAID - A Frequently Redundant Array of Independent Disks

by Stefan Savage, John Wilkes , 1996
"... Disk arrays are commonly designed to ensure that stored data will always be able to withstand a disk failure, but meeting this goal comes at a significant cost in performance. We show that this is unnecessary. By trading away a fraction of the enormous reliability provided by disk arrays, it is poss ..."
Abstract - Cited by 54 (4 self) - Add to MetaCart
quiet period between bursts of client activity. That is, AFRAID makes sure that the array is frequently redundant, even if it isn't always so. By regulating the parity update policy, AFRAID allows a smooth trade-off between performance and availability. Under real-life workloads, the AFRAID

A New Method for Mapping Optimization Problems onto Neural Networks

by Carsten Peterson, Bo Söderberg - International Journal of Neural Systems , 1989
"... : A novel modified method for obtaining approximate solutions to difficult optimization problems within the neural network paradigm is presented. We consider the graph partition and the travelling salesman problems. The key new ingredient is a reduction of solution space by one dimension by using gr ..."
Abstract - Cited by 166 (20 self) - Add to MetaCart
graded neurons, thereby avoiding the destructive redundancy that has plagued these problems when using straightforward neural network techniques. This approach maps the problems onto Potts glass rather than spin glass theories. A systematic prescription is given for estimating the phase transition

Securing Information Transmission by Redundancy

by Jun Li, Peter Reiher, Gerald Popek
"... Many approaches have been used or proposed for providing security Ior inlormation dissemination over networks, including encryption, authentication, and digital signafures. These mechanisms do not, however, necessarily help ensure that a message is delivered at all. Attacks that try to destroy or in ..."
Abstract - Add to MetaCart
availability data storage, file replication, and some faulttolerant systems. The se_curity problem has different characteristics that require different approaches to redundancy. We present one example of using redundancy to increase assurance of security updates delivery. 1
Next 10 →
Results 1 - 10 of 726
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University