Sciweavers

983 search results - page 139 / 197
» A Better Update Policy
Sort
View
WCNC
2010
IEEE
14 years 13 days ago
A Novel Stability Weighted Clustering Algorithm for Multi-Hop Packet Radio Virtual Cellular Network
—Cooperative communications exploit the spatial diversity inherent in multiuser system by allowing cooperation among users having a wide range of channel qualities. How to search...
Qiyue Yu, Na Zhang, Weixiao Meng, Fumiyuki Adachi
FAST
2008
13 years 11 months ago
The RAID-6 Liberation Codes
The RAID-6 specification calls for a storage system with multiple storage devices to tolerate the failure of any two devices. Numerous erasure coding techniques have been develope...
James S. Plank
USS
2008
13 years 11 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
GECCO
2010
Springer
158views Optimization» more  GECCO 2010»
13 years 11 months ago
Investigating the impact of sequential selection in the (1, 4)-CMA-ES on the noisy BBOB-2010 testbed
Sequential selection, introduced for Evolution Strategies (ESs) with the aim of accelerating their convergence, consists in performing the evaluations of the different offspring...
Anne Auger, Dimo Brockhoff, Nikolaus Hansen
DASFAA
2007
IEEE
151views Database» more  DASFAA 2007»
13 years 10 months ago
The Tornado Model: Uncertainty Model for Continuously Changing Data
To support emerging database applications that deal with continuously changing (or moving) data objects (CCDOs), such as vehicles, RFIDs, and multi-stimuli sensors, one requires an...
Byunggu Yu, Seon Ho Kim, Shayma Alkobaisi, Wan D. ...